• Title/Summary/Keyword: ubiquitous application

Search Result 786, Processing Time 0.023 seconds

Accounting Model for Mobile RFID Service (모바일 RFID 서비스를 위한 과금 모델)

  • Lee, Ho-Seon;Kim, Moon;Moon, Tae-Wook;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.76-79
    • /
    • 2007
  • RFID is issued as a core technology for Ubiquitous environment recently. Especially, Mobile RFID which is converged with RFID and wireless internet, provides new services to users, increased added-value to service providers. For commercial service of Mobile RFID, it needs an accounting service. The Diameter Base Protocol, mostly used for authentication, authorization, and accounting service, supports only deferred accounting service. For more variable accounting policy, Diameter Credit-Control Application which is capable of prepayment accounting, also should be considered. In this paper, a new accounting model with Diameter Credit-Control Application for Mobile RFID service is proposed.

  • PDF

Ubiquitous u-Health System using RFID & ZigBee (RFID와 ZigBee를 이용한 유비쿼터스 u-Health 시스템 구현)

  • Kim Jin-Tai;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.1 s.343
    • /
    • pp.79-88
    • /
    • 2006
  • In this paper, we designed and implemented ubiquitous u-Health system using RFE and ZigBee. We made a wireless protocol Kit which combines RFE Tag recognition and ZigBee data communication capability. The software is designed and developed on the TinyOS. Wireless communication technologies which hold multi-protocol stacks with RFID and result in the wireless ubiquitous world could be Bluetooth, ZigBee, 802.11x WLAN and so on. The environments that the suggested u-Health system may be used is un-manned nursing, which would be utilized in dense sensor networks such as a hospital. The the size of devices with RFID and ZigBee will be so smaller and smaller as a bracelet, a wrist watch and a ring. The combined wireless RFID-ZigBee system could be applied to applications which requires some actions corresponding to the collected (or sensed) information in WBAN(Wireless Body Area Network) and/or WPAN(Wireless Person Area Network). The proposed ubiquitous u-Health system displays some text-type alert message on LCD which is attached to the system or gives voice alert message to the adequate node users. RFE will be used as various combinations with other wireless technologies for some application-specific purposes.

A Study on Factors for Adopting of RFID Application Technology (RFID 응용 기술의 도입에 미치는 영향 요인에 관한 연구)

  • Park, Cha-Gil;Yi, Seon-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1018-1029
    • /
    • 2008
  • Recently, RFID(Radio Frequency Identification) application technology is the core of ubiquitous technology. this research examines the factors for adopting the RFID application technology together with factors for adopting the related information system such as ERP, SCM, EDI by researching relevant literature. this research attempts to derive the factors for adopting RFID application technology by using the Delphi Method. The factors for adopting the information technology of the above-mentioned three areas totaled 116 adoption factors. Based on these 116 adoption factors, the factors for adopting RFID application technology were to be derived. A total of 27 adoption factors were derived in the first Delphi investigation. Of the total 27 adoption factors, final 9 adoption factors could be derived by conducting frequency analysis and relative importance analysis. In other words, 9 adoption factors that were derived last were found to be the cost related to tag, relationship with customer firms, compatibility of technology, information technology-based structure, trust and coordination between business firms, intensity of competition within the industry, the standardization of RFID technology, the top management's support and participation degree of client companies. When business firms try to adopt RFID application technology afterwards, concrete and close examination from this point of view was found to be necessary.

Ubiquitous-Based Mobile Control and Monitoring of CNC Machines for Development of u-Machine

  • Kim Dong-Hoon;Song Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.455-466
    • /
    • 2006
  • This study was an attempt to control and monitor Computerized Numerical Controller (CNC) machines anywhere and anytime for the development of a ubiquitous machine (u-machine). With a Personal Digital Assistant (PDA) phone, the machine status and machining data of CNC machines can be monitored in wired and wireless environments, including the environments of IMT2000 and Wireless LAN. Moreover, CNC machines can be controlled anywhere and anytime. The concept of the anywhere-anytime controlling and monitoring of a manufacturing system was implemented in this study for the purpose of u-manufacturing and u-machines. In this concept, the communication between the CNC controller and the PDA phone was successfully performed anywhere and anytime for the real-time monitoring and control of CNC machines. In addition, the interface between the CNC controller and the developed application module was implemented by Object linking and embedding for Process Control (OPC) and shared CNC memory. For communication, the design of a server contents module within the target CNC was based on a TCP/IP. Furthermore, the client contents module within the PDA phone was designed with the aid of embedded c++ programming for mobile communication. For the interface, the monitoring data, such as the machine status, the machine running state, the name of the Numerical Control (NC) program, the alarm and the position of the stage axes, were acquired in real time from real machines with the aid of the OPC method and by sharing the CNC memory. The control data, such as the start, hold, emergency stop, reserved start and reserved stop, were also applied to the CNC domain of the real machine. CNC machines can therefore be controlled and monitored in real time, anywhere and anytime. Moreover, prompt notification from CNC machines to mobile phones, including cellular phones and PDA phones, can be automatically realized in emergencies.

Research of applied u-Health system using Inference Algorithm (추론 알고리즘을 적용한 유헬스 시스템 연구)

  • Shin, Su-Hong;Kim, Woo-Sung;Choi, Suny
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5518-5524
    • /
    • 2012
  • The world today, has come to an age of diverse paradigms and technologies being developed, and technology of a new field is realized by merging technologies of different fields.One of such, u-Health system refers to a system which can monitor its users, regardless of time and place, using many body sensor datas based on USN (Ubiquitous Sensor Network). In the past, this kind of u-Health system was able to collect sensor datas through wires and could be monitored only by using PC (Personal Computer), but with development in technology, the system is now becoming possible to collect sensor datas wireless and monitor unhindered by time and place. This research aims to collect sensor datas of the user, and through Jena inference network, provide web service and smartphone application which enables checking of user's body datas in times of emergency, whenever, wherever.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

Design and Implementation of SMS Application System with Wireless Internet Environment (무선인터넷환경과 연계한 SMS애플리케이션 시스템의 설계 및 구현)

  • Yang Hae-Sool;Hong Jung-Hun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1507-1516
    • /
    • 2004
  • Recently, the most remarkable word is 'ubiuuitous' in field of information and communication. Ubiquitous has a meaning 'exist everywhere' that means our daily life is connect as network. It means we can get the information which in need whenever and wherever with safety. We predict this word will be symbolical keyword which lead an information-oriented society including the internet a quite long it. It's already per-meate to us the Ubiquitous. It's taken by CCTV when we visit bank. It's made to us can know the fastest way the GPS system to be connected by an artificial satcllite on mobile, and many people use mobile and PDA for investment in stocks. Among them, it has begun to spread many mobile services to us. In this paper, it's the aim a creation of value added through an efficient mobile services to use wireless internet different with previous way, cutting down on expenses and business modeling.

OSGi based Service Middleware for Context-Aware Applications (상황 인식 응용을 위한 OSGi 기반 서비스 미들웨어)

  • Jung, Heon-Man;Lee, Jung-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.691-700
    • /
    • 2006
  • To support context-aware services in ubiquitous computing environments, there are required dynamic context managing, context reasoning and context modeling technologies. In previous researches, context services are designed using context ontology used in context aware middleware. So, context service cannot change the context ontology in execution time. In this paper, we propose a hierarchical ontology-based context management model and design a context-aware middleware based on this model for supporting active application adaptability and reflecting users' requirements dynamically in contextual changes. It also provides efficient support for inferencing, interpreting, acquiring and discovering various contexts to build context-aware services and presents a resolution method for context conflict which is occurred in execution of service. As the middleware is implemented on the OSGi framework, it can cause interoperability among devices such as computers, PDAs, home appliances and sensors. It can also support the development and operation of context aware services, which are required in the ubiquitous computing environment.

Concept Design of Marine-RFID (해상 RFID 개념 설계)

  • Ku, Ja-Young;Yim, Jeong-Bin;Jeong, Jung-Sik;Nam, Taek-Keun;Lee, Jae-Eung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.153-161
    • /
    • 2005
  • Recently, The government of Korea declared to develop RFID(Radio Frequency IDentification) as one of key strategic technology to perform U-Government using Ubiquitous technology. But, most of the related technologies for RFID are mainly focused on the inlaned application excepting marine applications. The last target of this study is to implement new Marine RFID(M-RFID) that can cover all of EEZ areas as large five times as inland volume. In this paper, as a basic study for the M-RFID, we carried out an establishing the concept design of M-RFID, developing the construction method of M-RFID and, extending the idea of M-RFID. As studying results, it is known that the M-RFID can be use in many practical areas such as the protection of EEZ area and aqua culture, the safety of fisher man, the disaster control for inlander and, fisheries ligistics with real-time.

  • PDF

Elderly Care System in the U-Health Environment (U-Health 환경에서의 노인 Care 시스템)

  • Jang, Hyeon-Suk;Ban, Tae-Hak;Jang, Se-Cheol;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2693-2698
    • /
    • 2013
  • As our country is currently facing "aging society," people demands for qualitively and quantitatively better social welfare services. In particular, the abruptly rapid increase in the elderly population requires various welfare services and medical care related to the elderly. It is urgent to resolve these demands. Also, IT technology in Korea is developing rapidly, and U-Health, a part of the Ubiquitous field is under the actively ongoing researches. In this paper, we studied the Elderly care system model suing U-Health technology. We designed the care system of the residential environment designed specific for the elderly. Additionally, based on that design, we studied the elderly care system using the ubiquitous technology. Since this elderly care system combines the existing community-based model and IT technology in conjunction with other mobile devices, we may supply a new care service application, thus solving the problems of the existing care and medical services.