• Title/Summary/Keyword: ubiquitous Computing

Search Result 1,432, Processing Time 0.029 seconds

Implementation of Environmental Information Monitoring System using Multi-Query Indexing Technique and Wireless Sensor (다중 질의 색인기법과 무선 센서를 이용한 환경정보 모니터링 시스템 구현)

  • Kim, Jung-Yee;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.307-312
    • /
    • 2007
  • Wireless Sensor Network(WSN) is considered as a core technology necessary for Ubiquitous computing, with its numerous possible applications in many practical areas, is being researched and studied actively by many around the world. WSN utilizes wireless sensors spatially placed to gather information regarding temperature, light condition, motion and change in speed of the objects within their surrounding environment. This paper implements an environmental information monitoring and indexing system based on spatial indexing technique by constructing a WSN system. This Multi-Query Indexing Technique coupled with wireless sensors provides an output based on the pre-defined built-in data index and new input from the sensors. If environment data is occured, system have to perform a proper action after collecting and analyzing this data. This is the purpose of implementing environment data monitoring system. We constructed environmental application using TinyOS and built tested with MICAz sensor bords. We designed and implemented a monitoring system which detects and multi-indexing process environmental data from distributed sensors.

  • PDF

A Framework for Quality Dimensions Measurement of Context Information (상황정보의 품질요소 측정 프레임워크)

  • Kim, Young-Hee;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.201-210
    • /
    • 2006
  • This study proposed a framework to clarify a viewpoint of quality problems, and to consider reliance, of context information in ubiquitous computing environments. The framework is structured as a sequence of steps in measuring the quality of context information. The first step in measuring the qualify of context information is to determine users of the context information. This is important because the type of users or applications determines the type of context information and thus the methods of measuring the qualify dimensions and the thresholds for evaluating the quality of context information. The other steps include methods for measuring each quality dimensions to allow quantitative evaluation of quality, establishing acceptable quality targets. We selected accuracy, completeness, up-to-dateness, access security, and representation as quality dimensions and proposed their measurement methods and concrete procedures. We enabled objective evaluation of quality level through proposal of methods suitable to quality measurement of context information.

  • PDF

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

An Expansion of Affective Image Access Points Based on Users' Response on Image (이용자 반응 기반 이미지 감정 접근점 확장에 관한 연구)

  • Chung, Eun Kyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.3
    • /
    • pp.101-118
    • /
    • 2014
  • Given the context of rapid developing ubiquitous computing environment, it is imperative for users to search and use images based on affective meanings. However, it has been difficult to index affective meanings of image since emotions of image are substantially subjective and highly abstract. In addition, utilizing low level features of image for indexing affective meanings of image has been limited for high level concepts of image. To facilitate the access points of affective meanings of image, this study aims to utilize user-provided responses of images. For a data set, emotional words are collected and cleaned from twenty participants with a set of fifteen images, three images for each of basic emotions, love, sad, fear, anger, and happy. A total of 399 unique emotion words are revealed and 1,093 times appeared in this data set. Through co-word analysis and network analysis of emotional words from users' responses, this study demonstrates expanded word sets for five basic emotions. The expanded word sets are characterized with adjective expression and action/behavior expression.

Analysis on Children's Response Depending on Teaching Assistant Robots' Styles (교사 보조 로봇 스타일에 따른 아동 반응 분석)

  • Jung, Jae-Gyeong;Choi, Jong-Hong;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.195-203
    • /
    • 2007
  • Together with the development of ubiquitous computing technology and robot technology, intelligent type robots are being utilized in many areas and the range is expected to become wider and wider. Among many service robots, the educational robots are being diversely studied in the field with the concept of r-Learning. Presently, teaching assistant robots require a lot of HRI studies prior to their practical use in the very near future and are not sufficient yet. Especially, the reactions of students based of the styles of robots (e.g. serious robot, playful robot) are very important in producing robot contents but there has been no case study on them. Therefore, in this study, the appearance of the IROBI was changed to become a teaching assistant robot and was used to test and compare elementary school students' interest, achievement and concentration depending on the styles of robot (playful, serious). The results showed that the interest was high in the group that had studied with the playful robot. The achievement however, did not show significant relations with the style of robot and that the concentration was high in the group that had studied with the serious robot.

  • PDF

A Structure of Users이 Context-Awareness and Service processing based P2P Mobile Agent using Collaborative Filtering (협력적 필터링 기법을 이용한 P2P 모바일 에이전트 기반 사용자 컨텍스트 인식 및 서비스 처리 구조)

  • Yun Hyo-Gun;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.104-109
    • /
    • 2005
  • Context-awareness is an important element that can provide service of good quality according to users' surrounding environment and status in ubiquitous computing environment. Information gathering tools for context-awareness use small size mobile devices which have easy movement and a mobile agent in mobile device. Now, Mobile agents are consuming much times and expense to collect and recognize each users' context information. Therefore, needs research about structure for users' context information awareness in early time to reduce mobile agent's load. This paper proposes a P2P mobile agent structure that mikes filtering techniques and a P2P agent in mobile agent. The proposed structure analyzes each user's context information in same area, and groups users who have similar preference degree. Grouped users share information using a P2P mobile agent. Also this structure observes and learns to continue on users' action and service, and measures new interrelation.

A comparative study on competitiveness of Busan harbor and Shanghai port for RFID introduction (RFID 도입을 위한 부산항과 상해항의 항만경쟁력 비교 연구)

  • Jin, Gi-Myung
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.413-429
    • /
    • 2014
  • This study analyzed competitiveness of introducing RFID to ports and logistics system focused on Busan port and Shanghai port. This research started from the question, what kind of synergy effect will be occurred when the core technology of ubiquitous computing, RFID technology is introduced to ports and logistics system. It investigated RFID system's influences on ports and logistics system based on the existing literature about effect of logistics information system on logistics result, and further, suggested measure to introduce RFID system successfully to future ports and logistics industry. As a result, it confirmed that Shanghai port is slightly more competitive than Busan harbor. Shanghai harbor has been evaluated more competitive port than Busan since 2007 but the difference is the matter. It is considered that a close gap between two harbors means neck and neck competition in the future. That is, our competitiveness in ports and logistics system is in danger and the competition in the industry will grow in intensity most definitely.

  • PDF

An implementation of block cipher algorithm HIGHT for mobile applications (모바일용 블록암호 알고리듬 HIGHT의 하드웨어 구현)

  • Park, Hae-Won;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.125-128
    • /
    • 2011
  • This paper describes an efficient hardware implementation of HIGHT block cipher algorithm, which was approved as standard of cryptographic algorithm by KATS(Korean Agency for Technology and Standards) and ISO/IEC. The HIGHT algorithm, which is suitable for ubiquitous computing devices such as a sensor in USN or a RFID tag, encrypts a 64-bit data block with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we optimize round transform block and key scheduler to share hardware resources for encryption and decryption. The HIGHT64 core synthesized using a $0.35-{\mu}m$ CMOS cell library consists of 3,226 gates, and the estimated throughput is 150-Mbps with 80-MHz@2.5-V clock.

  • PDF

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

Comparison of NTP and Master-Slave Network Synchronization Methods in in-door Environment (실내 망 동기화를 위한 NTP와 Master-Slave 방식의 비교)

  • Lee Hyojung;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.61-66
    • /
    • 2005
  • Location Positioning is a major technology for ubiquitous computing. Recently the research on Location Positioning using UWB is on going. In order to construct an in-door location network, synchronization of base stations is very important. NTP is Popularly used as clock synchronization protocol ranging from LAN to WAN. Also Master-Slave scheme is the simplest method to synchronize in-door network. We compare and analyze NTP and Master-Slave schemes according to the statistical channel model for indoor multipath propagation environment. In this paper, error ranges are calculated at various circumstances that in-door network expands from one primary base station into several base stations. We compared the correctness of NTP and Master-Slave synchronization methods. NTP is more reasonable synchronization protocol in in-door environment.