• Title/Summary/Keyword: ubiquitous applications

Search Result 539, Processing Time 0.028 seconds

Applying Ubiquitous Computing Technology to Proactive and Personalized Decision Support System

  • Kwon, Oh-Byung;Yoo, Ki-Dong;Suh, Eu-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.281-285
    • /
    • 2004
  • This paper aims to describe how the decision making capability and context-aware computing are jointly used to establish ubiquitous applications. An amended DSS paradigm: CKDDM is proposed in this paper. Under the CKDDM paradigm, a framework of ubiquitous decision support systems (ubiDSS) is addressed with the description of the subsystems within.

  • PDF

A Framework Development for Total Management of Various Embedded Devices (여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발)

  • Bae, HyunChul;Kim, SangWook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF

A Software Verification Technique for Ubiquitous Applications (Ubiquitous Application을 위한 소프트웨어 검증 기법)

  • Sun, Tae-Bong;In, Hoh Peter;Lu, Hong;Liu, Steve
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.346-348
    • /
    • 2004
  • 시스템의 안정성을 검증하는 Model Checking(모델 검증)은 여러 가지 분야에서 기본적으로 중요하게 사용되어왔다. 하지만 Model Checking의 특성상 Computing Power가 많이 필요한 점과 최근 소프트웨어의 대형화, Ubiquitous 환경에서의 잦은 변화가 필요한 점 등으로 Model Checking 을 그대로 적용하기 어렵다. 따라서 이 논문은 점증적인 변화에 따른 필요한 부분만 검증하는 점증적 모델 검증을 소개한다.

  • PDF

Real-Time Monitoring Agent for Ubiquitous System (유비쿼터스 시스템을 위한 실시간 모니터링 에이전트)

  • Kwon, Sung-Hyun;Lee, Byoung-Hoon;Kim, Jai-Hoon;Cho, We-Duke
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.803-807
    • /
    • 2008
  • The ubiquitous middleware configurated an aggregation of the various services. The services are made in different languages and the various services that are dynamically changing environment are carried out in collaboration service. The ubiquitous system that services in the these environment is required appropriate response to real-time system and reliability. In this paper, we suggest the monitoring agent that a monitoring system added or removed the services in real-time is made continuous monitoring in run-time environment and guaranteed performance and reliability of a application by maximally reducing overhead that combined with applications is occurred. The suggested scheme shows the demonstration to fit the scenario situation and verifies function and performance of monitoring about the service applications through the experiment.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

A development of the ubiquitous information model and the representation language (유비쿼터스 정보 모델링 및 표현 언어 개발)

  • Lee, Chang-Yeol
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.1
    • /
    • pp.19-25
    • /
    • 2007
  • In the ubiquitous environment, the interoperability among the several agencies or systems can be realized by the common information model of the applications The common information model plays role of the core in the several application. In this paper, we proposed the ubiquitous information model as the core and developed the ubiquitous information markup language can be used to the any ubiquitous environment.

A Modeling of Ubiquitous Environments Reflecting User's Behaviors in the House (주택 내에서의 사용자 행위 분석을 이용한 유비쿼터스 환경 구축 - 거실공간을 중심으로 -)

  • Lee, Dong-Hwa;Park, Sung-Jun;Lee, Hyun-Soo
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2005.11a
    • /
    • pp.63-66
    • /
    • 2005
  • The purpose of this study is to suggest the modeling of ubiquitous environments according to the analysis of user's behaviors focused on the living area within the house. Recently, with appearing 'Ubiquitous environments', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment. Also, it very important for us to configure proper sensors and technologies by the priority based on user's behaviors. To sum up, this study is aimed to analyze user's behaviors and then, to suggest the guideline for users offering optimal ubiquitous environments.

  • PDF

A Configuration Methods of Sensor Reflecting User's Behaviors in the Ubiquitous House (유비쿼터스 주택에서의 사용자 행위에 따른 센서 기기 구성방법에 관한 연구 - 시나리오에 따른 사용자 행위 분석을 기반으로 -)

  • Lee, Dong-Hwa;Park, Sung-Jun;Lee, Hyun-Soo
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.10a
    • /
    • pp.111-114
    • /
    • 2005
  • The purpose of this study is to suggest configuration methods of sensor according to user's behaviors in the ubiquitous house. Recently, with appearing the concept of 'Ubiquitous', the applications of ubiquitous technologies on the our environment adopt a new paradigm. This new paradigm leads to the possibility of creating more intellectual dwelling environment according to user's behaviors. This paper suggests to change our dwelling by considering both engineering technology and considering the character of dwelling, because the house should provide causes humans with comfortability. Therefore, we need to understand user's behaviors in the dwelling, towards user friendly environment.

  • PDF

(ubi-UCAM: an Unified Context-Aware Application Model for ubiHome) (ubiHome을 위한 컨텍스트 기반 응용 서비스 모형)

  • 장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.550-558
    • /
    • 2003
  • Context-aware application plays an important role in ubiquitous computing (ubiComp) environment by providing user with anytime, anywhere services even without any explicitly triggered command. In this paper we propose a unified context-aware application model which is an essential part to develop various applications in ubiquitous computing environment. The proposed model affirms the independence between sensor and application by using unified context in the form of 5W1H. It also ensures that application exploits relatively accurate context to trigger personalized services. To show usefulness of the proposed model, we apply it to the sensors and applications in the ubiHome, a test bed for ubiComp-enabled home applications. According to the experimental results, without loss of generality, we believe it can be extended to various context-aware applications in daily life.

Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services (모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인)

  • No, Mi-Jin;Kim, Byung-Gon;Park, Soon-Chang
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.