• Title/Summary/Keyword: ubiquitous application

Search Result 786, Processing Time 0.028 seconds

A Study on the Application Technique of 3-D Spatial Information by integration of Aerial photos and Laser data (항공사진과 레이져 데이터의 통합에 의한 3 차원 공간정보 활용기술연구)

  • Yeon, Sang-Ho
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.3
    • /
    • pp.385-392
    • /
    • 2010
  • A LiDAR technique has the merits that survey engineers can get a large number of measurements with high precision quickly. Aerial photos and satellite sensor images are used for generating 3D spatial images which are matched with the map coordinates and elevation data from digital topographic files. Also, those images are used for matching with 3D spatial image contents through perspective view condition composed along to the designated roads until arrival the corresponding location. Recently, 3D aviation image could be generated by various digital data. The advanced geographical methods for guidance of the destination road are experimented under the GIS environments. More information and access designated are guided by the multimedia contents on internet or from the public tour information desk using the simulation images. The height data based on LiDAR is transformed into DEM, and the real time unification of the vector via digital image mapping and raster via extract evaluation are transformed to trace the generated model of 3-dimensional downtown building along to the long distance for 3D tract model generation.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.

The Structure of 3-Tirer Context-awareness Processing Server/client based Intelligent Agents (지능형 에이전트 기반의 3-Tirer 컨텍스트 인식 처리 서버/클라이언트 구조)

  • Yun, Hyo-Gun;Lee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.479-485
    • /
    • 2005
  • Recently, computing technology requires intelligent system structures for context-awareness in ubiquitous computing environment. An intelligent system for context-awareness is based on agents, and need sensor information to recognize users and frames to support service. Therefore, this paper proposes the structure of 3-tier context-awareness processing server/client that can connect dynamically with each sensor and service, and support various context stably The structure of a proposal system is composed of a client class that recognizes uses' context information, a server class that processes realized context information by an application processing agent, and a management server that manages these two classes. Also, in this structure users information is composed of dynamic profile to support exquisite service.

Design of RFID System Using Spread Spectrum (스프레드스펙트럼통신방식을 적용한 RFID시스템 설계)

  • Baek, Seung-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.42-49
    • /
    • 2007
  • This paper implements RFID(radio-frequency identification)System to which the system was apply SS(Spread Spectrum) method. The system designed by using the algorithm for microprocessor with PLL of the receiver, PN spread, modulation and demodulation of the transceiver, and transistor amplifier for the output of stabilized BPSK (Binary Phase Shift Keying) signal. furthermore, it reduced the interference of the signal by designing the micro-strip narrow banded patch antenna, which is convenient for printing and producing, and decreased the volume of filter size in the system. It is also designed for the lower powered system with the possible application to UHF band of $860\sim930MHz$ for the international standard frequency band, which is the quota share of RFID distribution system.

A study of LED light control system application based on Ubiquitous sensor network (유비쿼터스 센서 네트워크 기반 LED 조명제어시스템 적용에 관한 연구)

  • Lee, An-kyu;Park, Byung-don;Gil, Jun-pyo;Shin, Gang-wook;Park, Hye-Mi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.188-191
    • /
    • 2013
  • In this paper, in order to economize energy inside the vertical-type water treatment plant, a chamber-illumination-LED control board, which operates via nature light or human's touches, is proposed. Moreover, this illumination control process is contrived to be wirelessly monitored in real-rime. In addition, Zigbee communication code is programmed to implement the control board's function of wireless data transmission and automatic LED brightness control. The presented control method contrives brightness to be adjusted in real-time by dimming control, which means nature light changes control, so that the interior energy can realize the maximum energy conservation.

  • PDF

Intelligent Surveillance System for Urban Transit using Context-aware technology (도시철도 지능형 종합 감시시스템을 위한 상황인식기술 적용방안 연구)

  • An, Tae-Ki;Shin, Jeong-Ryol;Lee, Woo-Dong;Kim, Moon-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.399-400
    • /
    • 2007
  • The one of the necessary technologies to live in the ubiquitous society that we can exchange some informations whenever it is and wherever we are, is the technology of context-awareness. The technology of context-awareness can be used various fields-medical science, national defense, national security and etc. and the technology can affect our society by and large. The technology of context-awareness is also applicable to many fields in the urban transit. In this paper, we describe the present condition of the technology of context-awareness and the examples of practical application of it and suggest some plans that are applicable to build an intelligent surveillance system for urban transit. We can connect the operating officer who is in the nearest to the place where the some events happened within the urban transit service area through the intelligent surveillance system for urban transit and we can eel a foothold in perceiving automatically various events within urban transit service area. So, the technology of context-awareness is the basic technology to realize an intelligent surveillance for urban transit, for the security of passengers and the protection of facilities in urban transit.

  • PDF

The Concept and Application of Sensor-based Integrated Intelligent Management of Urban Facilities for the u-City (센서 기반 지능형 u-City 도시시설물 통합관리의 개념 및 적용)

  • Lee, Jae Wook;Baik, Song Hoon;Seo, Myung Woo;Song, Kyu Seog
    • KIEAE Journal
    • /
    • v.9 no.5
    • /
    • pp.97-104
    • /
    • 2009
  • In the process of urban development, the increase in the number and the complexity of urban facilities gives rise to a variety of problems, such as increase in construction and maintenance cost. In particular, taking into account the fact that an emergency situation in an urban facility can cause substantial loss of property as well as casualties, it becomes important to intelligently perceive states of facilities and properly execute countermeasures through real-time monitoring. In recent years, practitioners and researchers have made efforts to improve current passive and manpower-dependent facility management systems to be more active and intelligent, by applying diverse ubiquitous computing technologies for the u-City project. In this study, after discussing major drawbacks of the conventional facilities management, the concept and the model of a sensor-based integrated intelligent management system for urban facilities are proposed. The proposed model, by analyzing and processing real-time sensor data from urban facilities, not only supports the management of individual facilities, but also enables the detection of complex facility-related events and the process of their countermeasures. This active and intelligent management of urban facilities is expected to overcome the limitation of the conventional facilities management, and provide more suitable facility management services for the u-City development.

A Technical Analysis of Real Time Location System for Automation in Construction (건설작업 자동화를 위한 실시간위치추적시스템 분석)

  • Kim, Kyoon-Tai
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.15-18
    • /
    • 2009
  • Due to its high dependency of manpower, construction work has several difficulties in terms of quality control, imbalance of supply and demand of qualified manpower, safety management for them and improvement of production. Such problems related to the management can be at some degree solved by introducing an automation facility. Since the unique environment of a construction site in the past was not structured, it is very hard to introduce a facility to automate construction work from operation of the equipment to assignment of where to work. This is a preliminary research for automation of construction work. In this study, the trend of development of a cutting-edge technology, RTLS, was researched and analyzed in order to review the possibility of utilizing RTLS in construction work and present a control mechanism for construction equipment. Although the presented mechanism is at the concept stage, which still has lots of restrictions to be solved, the application of the RTLS will be very much feasible. That is, if linkage of the study between the RTLS and the automation of construction is built, it will be expected to contribute to many fields such as cost reduction through efficient and systemic management, the reduction of construction period and precise construction as well as raising the level of the automation of domestic construction work.

  • PDF

Power control protocol for reduction of energy consumption in Wireless Sensor Netoworks (무선 센서 네트워크 환경에서 노드의 에너지 소비 절감을 위한 파워 제어 프로토콜)

  • Han Jung-ahn;Kim Yn-hyng;Kim Byung-gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.28-36
    • /
    • 2005
  • Wireless Sensor Networks are the technology, in which various applications such as surveillance and information gathering are possible in the uncontrollable area of human. And numerous studies are being processed for the application of ubiquitous network environment. One of major issues in sensor network is the research for prolonging the lifetime of nodes through the use of various algorithms, suggested in the mac and routing layer. In this paper, aiming at reducing energy waste, caused by redundant transmission and receipt message, we propose the mac protocol using active signal and analysis performance through simulation.

Experiment and Analysis of Session-key Authentication Mechanism based on MANET (MANET 기반 세션키 인증기법의 실험 및 분석)

  • Lee, Cheol-Seung;Jung, Sung-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1355-1360
    • /
    • 2015
  • Recently MANET application is diversified studies on the MANET routing security and the reliable authentication mechanism is actively in progress. Stand-alone network structure of a MANET is an important field of ubiquitous computing environment of interest, Authentication techniques are already provided safety when applied to MANET reliability and efficiency in a secure authentication mechanism using the session key. However, most of the MANET environment, the model has been based on the assumption that the safety is guaranteed, When applied to an actual network situation, we can not rule out a variety of threats. This study is the testing and analysis to add the malicious node extracted at random to demonstrate the safety and efficacy of the session key certification techniques of the MANET environment.