• Title/Summary/Keyword: ubiquitous application

Search Result 786, Processing Time 0.025 seconds

A Study on POS Application by Using ZigBee Based on Ubiquitous (유비쿼터스 기반의 ZigBee 를 통한 POS 활용)

  • Hyun, Min;Min, Sung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.135-137
    • /
    • 2011
  • POS(Point of Sales) 시스템이란 매출을 발생시키는 유통업체 금전출납계에 설치되어 매장에서 발생하는 판매시점의 모든 정보를 실시간으로 수집, 가공, 처리, 저장하여 각 부문별 정보를 분석, 평가, 종합 할 수 있는 상품의 판매 결과를 기록하는 시스템이다. 다양한 업종에서 POS SYSTEM(주문 관리 시스템)의 도입으로 보다 효율적인 업무를 처리하고 있지만 기존의 획일적인 POS 시스템들은 고가의 전용장비를 이용하고 물리적인 제약으로 인하여 비용, 규모, 구성면에서 적합하지 않다. 본 논문에서 제안한 유비쿼터스 기반의 ZigBee 를 이용한 시스템은 휴대단말기의 무선제어 기술과 연계를 통해 여타 기술 대비 편리성, 재사용성 및 시스템 구축 비용의 절감을 통해 시스템의 효율성을 높일 것 이다. 또한 네트워크 단축 경로 검색 기술과 양방향 통합 리모콘 설계와 같은 유비쿼터스 기반의 ZigBee 기술을 통해 시스템의 부가가치를 높이는 등 산업에 보다 나은 발전을 가져오게 될 것으로 전망된다.

A Context Fusion Approach for Temporal Data and Spatial Data (시간적 데이터와 공간적 데이터의 문맥적 융합 접근방법에 관한 연구)

  • Kwon, Nam-Gi;Kim, Jung-Kee;Lee, Joo-Hwan;Kim, Jung-Hyun;Kim, Won-Il
    • Journal of Korea Entertainment Industry Association
    • /
    • v.4 no.2
    • /
    • pp.58-63
    • /
    • 2010
  • The varieties of situated cognition applications provide various information to a user in a ubiquitous computing environment. In this paper, We propose a system that provides an optimized output using a fusion of temporal data and spatial data from sensing devices.

Robust Face Detection Regardless of Camera Viewing Direction (카메라 뷰잉 각도에 안정적인 얼굴 검출)

  • Lee, Won-Jae;Cho, We-Duke;Choi, Yoo-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.189-192
    • /
    • 2007
  • 본 논문에서는 대부분의 공동 영역에서 사용하는 상부에 설치된 감시카메라에서 사람의 얼굴 영역을 검출할 수 있는 방법을 제안한다. 본 제안 기법에서는 입력 영상에 대한 원근 변환을 통하여 영상 보정을 처리하고 보정된 영상에서 얼굴 감지 알고리즘을 적용함으로써 기존의 방법에서 검출할 수 없는 고개를 숙인 얼굴에서도 얼굴을 검출할 수 있도록 하였다. 실험결과 고개를 숙인 얼굴이나 상부의 카메라에 의해 촬영된 영상에서 기존의 방법에 비해 보다 안정적으로 얼굴 영역을 검출할 수 있었다.

Color Similarity for Clothes using Non-Parametric Clustering (비모수적 클러스터링을 이용한 의상 색상 유사도)

  • Ju, Hyungdon;Hong, Min;Cho, We-Duke;Choi, Yoo-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.193-196
    • /
    • 2007
  • 본 논문은 비모수적 클러스터링 기법을 이용하여 다양한 조명에 노출된 의상들의 색상 유사성을 안정적으로 판단하는 방법을 제안한다. 색상 유사성 판별을 위하여 기존에 대표적으로 사용되어왔던 히스토그램 인터섹션이나 누적 히스토그램 방법은 조명 변화에 민감하게 반응하여, 동일한 의상 색상이라 할지라도 서로 다른 조명환경에서는 서로 상이한 색상 판별 결과를 나타낸다. 본 논문에서는 조명에 의한 영향을 줄이고, 색상 자체의 분포 특성을 분석하기 위하여 조명조건의 변화에도 일관된 특성을 유지하는 색도와 채도 컬러 성분에 대한 분포 특성을 비모수적 클러스터링 기법을 적용하여 분석한다. 실험 결과 제안기법은 동일한 의상 쌍과 상이한 의상 쌍에 대하여 구분을 지을 수 있는 양자화의 특성이 뚜렷하게 표현되었다.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

An Application Case of Utility Tag-based Convention Service System: Cosmetics and Beauty Expo, Osong Korea 2013 (다양한 유틸리티 태그를 활용한 컨벤션 서비스 시스템 적용 사례: 2013 오송 화장품·뷰티 세계박람회를 중심으로)

  • Choi, Myoung Hee;Jun, Jungho;Kang, Heegoo;Lee, Kyoung Jun
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.111-128
    • /
    • 2013
  • Conventions play important roles as tools for effective marketing. It will be able to understand the changes of particular industry's market, develop a new market and potential clients, and get a chance such as strategic network constructing. To support effective viewing of visitors, conventions have introduced a variety of ubiquitous computing technologies. This study introduces a case of applying the Utility Tag-based convention service system at the Cosmetics & Beauty Expo, Osong Korea 2013. The Utility Tag-based convention service system is constructed total three systems: (1) NFC Tag Management System; allowing effective access and management of NFC tags in various locations and objects, (2) Information Provide System; allowing participating vendors to manage information they want to provide information to visitors, and (3) Utility Tags; providing a variety of service to visitors for effective viewing in exhibition/convention space. This study first explores literature review and applying case related to ubiquitous computing in this field and introduces Applying an Utility Tag-based convention service system. In addition, we analyze visitors' behaviors and association rules by take advantage of collected touch data, present various possible for applications of the Utility Tag-based convention service system.

  • PDF

A Study on The Complex Event Detection Methods Based on Bitmap Index for Stream data Processing (스트림 데이터 처리를 위한 비트맵 인덱스 기반 복합 이벤트 검출 기법에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • Event-based service technology integrate service to detect events that occur in real time by analyzing the response. Is the core technology for real-time business and ubiquitous service environment construction. Is required event-based service technology on business processes in real-time business environment that providing rapid response to changing and custom service using a variety of information real-time monitoring and analysis in ubiquitous service environment. Last event-driven business processes can be used as a CEP(Complex Event Processing). The core of CEP technology, the event from multiple event sources analysis of events affecting and the way to handle action, is detect complex event to user. In previous studies, an event occurs that continue to perform without the need for partial operations. so many operations and spend a lot of memory is a problem. To solve these problems, event detection technique is proposed that large streams of data without processing any events, registered to configure a complex event occurs when all events in the application layer, complex event processing. The proposed method, first using a bitmap index to manage the event occurs. The complex events of the last event in response to define a trigger event. The occurrence of an event to display a bitmap index, a composite event occurrence of all event to configure the test through the point at which a trigger event occurs. Is proposed, If any event occurs to perform the operation. The proposed scheme perform operations when all event occurs without events having to perform each of the tests. As a result, avoid unnecessary operations and reducing the number of events to handle the increased efficiency of operations.

Visual Representation of Temporal Properties in Formal Specification and Analysis using a Spatial Process Algebra (공간 프로세스 대수를 이용한 정형 명세와 분석에서의 시간속성의 시각화)

  • On, Jin-Ho;Choi, Jung-Rhan;Lee, Moon-Kun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.339-352
    • /
    • 2009
  • There are a number of formal methods for distributed real-time systems in ubiquitous computing to analyze and verify the behavioral, temporal and the spatial properties of the systems. However most of the methods reveal structural and fundamental limitations of complexity due to mixture of spatial and behavioral representations. Further temporal specification makes the complexity more complicate. In order to overcome the limitations, this paper presents a new formal method, called Timed Calculus of Abstract Real-Time Distribution, Mobility and Interaction(t-CARDMI). t-CARDMI separates spatial representation from behavioral representation to simplify the complexity. Further temporal specification is permitted only in the behavioral representation to make the complexity less complicate. The distinctive features of the temporal properties in t-CARDMI include waiting time, execution time, deadline, timeout action, periodic action, etc. both in movement and interaction behaviors. For analysis and verification of spatial and temporal properties of the systems in specification, t-CARDMI presents Timed Action Graph (TAG), where the spatial and temporal properties are visually represented in a two-dimensional diagram with the pictorial distribution of movements and interactions. t-CARDMI can be considered to be one of the most innovative formal methods in distributed real-time systems in ubiquitous computing to specify, analyze and verify the spatial, behavioral and the temporal properties of the systems very efficiently and effectively. The paper presents the formal syntax and semantics of t-CARDMI with a tool, called SAVE, for a ubiquitous healthcare application.

UbiCore : An Effective XML-based RFID Middleware System (UbiCore : XML 기반 RFID 미들웨어 시스템)

  • Lee, Hun-Soon;Choi, Hyun-Hwa;Kim, Byoung-Seob;Lee, Myung-Cheol;Park, Jae-Hong;Lee, Mi-Young;Kim, Myung-Joon;Jin, Sung-Il
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.578-589
    • /
    • 2006
  • Owing to the proliferation of Radio Frequency Identification (RFID) technologies which is being watched as a core technology of ubiquitous computing, applications which offer convenience to people using RFID technologies are more and more increased. To easily develop these applications, a middleware system which acts as a bridge between RFID hardware and application is essential. In this paper, we propose a novel XML-based RFID middleware system called UbiCore (Ubiquitous Core). UbiCore has following features: First, UbiCore employs its own query language called XQueryStream (XQuery for Stream Data) which is originated from XQuery. Second, UbiCore has the preprocessing phase called pre-filtering prior to query evaluation and reuses the intermediate result of previous evaluation to speed up the processing of RFID tag data stream. Third, UbiCore supports query on both continuously generated stream data and archived historical data. And last, UbiCore offers a distinct markup language called Context-driven Service Markup Language (CSML) to easily specify the linking information between context and service.

A Study on Time Synchronization Protocol to Cover Efficient Power Management in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 효율적인 시간 동기화 프로토콜 연구)

  • Shin, Moon-Sun;Jeong, Kyeong-Ja;Lee, Myong-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.896-905
    • /
    • 2010
  • The sensor networks can be used attractively for various application areas. Time synchronization is important for any Ubiquitous Sensor Networks (USN) systems. USN makes extensive use of synchronized time in many contexts for data fusion. However existing time synchronization protocols are available only for homogeneous sensor nodes of USN. It needs to be extended or redesigned in order to apply to the USN with heterogeneous sensor nodes. Because heterogeneous sensor nodes have different clock sources with the SinkNode of USN, it is impossible to be synchronized global time. In addition, energy efficiency is one of the most significant factors to influence the design of sensor networks, as sensor nodes are limited in power, computational capacity, and memory. In this paper, we propose specific time synchronization based on master-slave topology for the global time synchronization of USN with heterogeneous sensor nodes. The time synchronization master nodes are always able to be synchronized with the SinkNode. Then time synchronization master nodes enable time synchronization slave nodes to be synchronized sleep periods. The proposed master-slave time synchronization for heterogeneous sensor nodes of USN is also helpful for power saving by maintaining maximum sleep time.