• Title/Summary/Keyword: ubiquitous application

Search Result 786, Processing Time 0.023 seconds

A Design and Implementation of the Remote Control Black Box System of Vehicle Using the Smart Phone

  • Song, Jong-Geun;Jang, Won-Tae;Kim, Tae-Yong
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.665-670
    • /
    • 2010
  • This paper suggests the vehicle remote control on the basis of Smart Phone. In general, most smart phone is mounted with G-sensor to control the motion. G-sensor is able to control several directions and movements of velocity along with X, Y, and Z axis. To access remote location and data system, we can also utilize Wi-Fi communication as well as bluetooth communication. In this study, we propose the scheme that is the car management application by remote control via real-time monitoring on mobile device for user convenience.

Performance Evaluation of Wavelet-based ECG Compression Algorithms over CDMA Networks (CDMA 네트워크에서의 ECG 압축 알고리즘의 성능 평가)

  • 김병수;유선국
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.9
    • /
    • pp.663-669
    • /
    • 2004
  • The mobile tole-cardiology system is the new research area that support an ubiquitous health care based on mobile telecommunication networks. Although there are many researches presenting the modeling concepts of a GSM-based mobile telemedical system, practical application needs to be considered both compression performance and error corruption in the mobile environment. This paper evaluates three wavelet ECG compression algorithms over CDMA networks. The three selected methods are Rajoub using EPE thresholding, Embedded Zerotree Wavelet(EZW) and Wavelet transform Higher Order Statistics Coding(WHOSC) with linear prediction. All methodologies protected more significant information using Forward Error Correction coding and measured not only compression performance in noise-free but also error robustness and delay profile in CDMA environment. In addition, from the field test we analyzed the PRD for movement speed and the features of CDMA 1X. The test results show that Rajoub has low robustness over high error attack and EZW contributes to more efficient exploitation in variable bandwidth and high error. WHOSC has high robustness in overall BER but loses performance about particular abnormal ECG.

Design and Implementation of Context-awareness Interpretation Structure for Intelligent Service (지능형 서비스를 위한 상황인식 해석 구조 설계 및 구현)

  • Lim, Tae-Hyun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.123-134
    • /
    • 2006
  • In this research paper, We have proposed an interpretation structure concerned with context-awareness which is essential to provide intelligent service. The proposed model has an interpretation structure that integrated information of both external and internal context, and been designed to keep independency between context information and application service. To verify the interpretation structure that proposed, we established a test bed (Ubi-Class) in which the concept of context awareness has been introduced to the existing class room, and constituted a scenario, and tested whether intelligent service is performed according to context interpretation.

  • PDF

A Study on Licence Management Model for Contents Circulation which Ubiquitous Environment is Safe (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.366-370
    • /
    • 2011
  • This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

A Study on Data Binding of XML for Context Aware Application in Ubiquitous (유비쿼터스의 상황인식 어플리케이션을 위한 XML데이터 바인딩 기술에 대한 연구)

  • Moon, Ji-Suk;Yoon, Hoi-Jin;Choi, Byoung-Ju
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.493-495
    • /
    • 2005
  • 유비쿼터스 컴퓨팅의 상황정보들은 서비스기반아키텍쳐와 같은 환경에서 XML기술을 기반으로 구성되며 공유된다. 따라서 상황인식 어플리케이션은 상황정보를 표현하는 XML문서를 대상으로 하는 행위들의 구현으로 볼 수 있다. 이때 상황인식 어플리케이션 구현의 시작을 XML 스키마 기반의 소스코드 템플리트를 이용한다면, 보다 정확하게 상황정보를 표현하는 어플리케이션을 구현할 수 있는 기반을 마련할 수 있다. 본 논문에서는 XML을 이용하는 방법 가운데, 기존의 파서를 통한 접근 방법이 아닌 바인딩 기술을 이용한 접근방법을 통해, 상황정보를 가지고 있는 XML 파일의 스키마 구조를 표현하는 어플리케이션 템플리트 생성한다. 이를 위해 본 논문은, 첫째, 바인딩 기술이 기존의 파서를 통한 접근법보다. 유비쿼터스 상황인식에 유리한 이유를 분석하였으며, 둘째, 여러 가지 바인딩 기술들을 항목별로 분석하여 상황인식 어플리케이션 템플리트를 만드는데 가장 적합한 한가지를 선정한다. 마지막으로 상황정보를 표현하는 XML을 이용하여 어플리케이션을 구현하는 방법의 이해를 돕기 위해 액티브 배지 시스템의 한 부분인 "Call Forwarding"에 본 논문에서 제안하는 방법을 적용하는 예제를 보인다.

  • PDF

Development of an RFID Goggle to Deliver Medication Information to the Blinds (시각장애인 의약품 정보 안내를 위한 RFID 고글 개발)

  • Kim, Jin Young;Kang, Joonhee
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.122-126
    • /
    • 2014
  • Recent development of ubiquitous technology prompted its application for the blinds. In this work, we developed an RFID goggle equipped with a voice guide for the blinds who have difficulties in obtaining medication informations. When a blind, wearing our RFID goggle, tags the RFID tag attached to a drug, the RFID goggle announces the already saved medication information. We used STM32 as MCU and MFRC523 for RFID chipset in the reader. Our miniaturized hardware supported ISO 14443A protocol, and the standardized conformance test was performed. When the blinds wear our RFID goggle, they can conveniently access to the medication informations, and thus the drug misuse cases may decrease.

A Study on Spectrum with Cognitive Radio for Real-time Streaming Transmission (실시간 스트리밍 전송을 위한 Cognitive Radio 시스템에 대한 연구)

  • Lee Sang-Heon;Kang Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.6 no.3
    • /
    • pp.179-184
    • /
    • 2005
  • We concern practical of utilizable frequency with wireless communication and broadcast technology. And, present that wireless application technology such of Ubiquitous sensor network, mobile or fixed wireless communication and wireless broadcast will require more efficiently using of frequency. In this paper, we studied Cognitive Radio That necessity of cognitive and intelligent technology in variable wireless environment and IEEE 802.22 standardization.

  • PDF

Case Studies on Smart Sensor Application for the Next Generation High-Speed EMU (차세대 고속철도(동력분산식)에 적용할 스마트센서 사례 연구)

  • Chang, Duk-Jin;Kang, Song-Hee;Song, Dahl-Ho
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1995-2005
    • /
    • 2008
  • Recently, the smart sensors and USN (Ubiquitous Sensor Network) technologies are emerging. Smart sensors add the capability of storing local temporary data, processing instant operations, transmitting information outward, to the simple sensing devices. The USN is a wireless network of sensor/smart sensors that can collect data anywhere anytime and exchange the data within the network. In this research, case studies are performed on the smart sensors and USN applications. The cases were grouped in four categories, domestic private, domestic public, foreign private, and foreign public. Based on that survey, promising applications will be proposed and developed to be implemented to the next generation high-speed EMU.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Dynamic Threshold based Even-wear Leveling Policies (동적 임계값을 이용한 메모리 소거)

  • Park, Je-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.5-10
    • /
    • 2007
  • According to the advantageous features of flash memory, its exploitation and application in mobile and ubiquitous related devices as well as voluminous storage devices is being increased rapidly. The inherent properties that are determined by configuration of flash memory unit might restrict the promising expansion in its utilization. In this paper, we study policies based on threshold values, instead of using global search, in order to satisfy our objective that is to decrease the necessary processing cost or penalty for recycling of flash memory space at the same time minimizing the potential degradation of performance. The proposed cleaning methods create partitions of candidate memory regions, to be reclaimed as free, by utilizing global or dynamic threshold values. The impact of the proposed policies is evaluated through a number of experiments, the composition of the optimal configuration featuring the methods is tested through experiments as well.

  • PDF