• Title/Summary/Keyword: ubiquitous communication

Search Result 1,214, Processing Time 0.031 seconds

Multiple Dimension User Motion Detection System base on Wireless Sensors (무선센서 기반 다차원 사용자 움직임 탐지 시스템)

  • Kim, Jeong-Rae;Jeong, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.700-712
    • /
    • 2011
  • Due to recently advanced electrical devices, human can access computer network regardless of working location or time restriction. However, currently widely used mouse, joystick, and trackball input system are not easy to carry and they bound user hands exclusively within working space. Those make user inconvenient in Ubiquitous environments.. In this paper, we propose multiple dimension human motion detection system based on wireless sensor networks. It is a portable input device and provides easy installation process and unbinds user hands during input processing stages. Our implemented system is comprised of three components. One is input unit that senses user motions and transmits collected data to receiver. Second is receiver that conveys the received data to application, which runs on server computer. Third is application that performs command operations according to received data. Experiments shows that proposed system accurately detect the characteristics of user arm motions and fully support corresponding input requests.

Browser fuzzing and analysis using known vulnerability (소프트웨어 취약점의 종류와 탐색 방법)

  • Kim, Nam-gue;Kim, Hyun Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.753-756
    • /
    • 2015
  • Internet technology is universal, news from the Web browser, shopping, search, etc., various activities have been carried out. Its size becomes large, increasing the scale of information security incidents, as damage to this increases the safety for the use of the Internet is emphasized. IE browser is ASLR, such as Isolated Heap, but has been continually patch a number of vulnerabilities, such as various protection measures, this vulnerability, have come up constantly. And, therefore, in order to prevent security incidents, it is necessary to be removed to find before that is used to exploit this vulnerability. Therefore, in this paper, we introduce the purge is a technique that is used in the discovery of the vulnerability, we describe the automation technology related thereto. And utilizing the known vulnerabilities, and try to show any of the typical procedures for the analysis of the vulnerability.

  • PDF

A Review Study of Interface Technology based Internet of Things (사물인터넷 기반 인터페이스 기술에 관한 문헌적 고찰)

  • Jin, Chan-Yong;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.115-117
    • /
    • 2016
  • Recently, many IoT(internet of things) products are emerging on the market and information technology companies are competing on the areas of internet of things standardization and platforms. This paper introduces many researches, standardizations, platforms on internet of things. Because of that, as the interest in this area out focused, many kinds of technology and new service are being exploited in this field. Therefore, we conducted a review research based on the internet of things. Also, this study was targeted a total of 34 research papers that are setting up the related internet of things among the research papers published in domestic academic journals since 2010. In this review, the studies related internet of things showed that the most is studied between 2014 and 2015. This study suggests practical and theoretical implications based on the results.

  • PDF

Design and Implementation of a 3D Pointing Device using Inertial Navigation System (관성항법시스템을 이용한 3D 포인팅 디바이스의 설계 및 구현)

  • Kim, Hong-Sop;Yim, Geo-Su;Han, Man-Hyung;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.83-92
    • /
    • 2007
  • In this paper, we present a design and implementation of three dimensional pointing device using Inertial Navigation System(INS) that acquires coordinates and location information without environmental dependancy. The INS measures coordinates based on the data from gyroscope and accelerometer and corrects the measured data from accelerometer using Kalman-Filter. In order to implement the idea of three dimensional pointing device, we choose a three dimensional Space-recognition mouse and use RFIC wireless communication to send a measured data to receiver for printing out the coordinate on display equipment. Based on INS and Kalman-Filter theoretical knowledge, we design and implement a three dimensional pointing device and verified the usability as an input device that can capture a human's move. also, we describe the applicability of this device in ubiquitous computing environment.

  • PDF

A study of Technical Reference Model of Intelligent Geospatial Information (지능형 공간정보 기술참조모델에 관한 연구)

  • Park, Dong-Youn;Lee, Yong-Ik;Choi, Hoon-Sung;Park, Jae-Min;Jung, Yeun-J.;Park, Soo-Hong;Kim, Byoun-Guk
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.309-317
    • /
    • 2009
  • Recently, convergence phenomena among industries are appeared with the rapid development of information and communication technology and technology convergence also is emerging as a key issue. Especially, geospatial information industry may be expected to conduct a role as a pioneer in this convergence era. In order to do this, all fields of geospatial information should be classified systematically and interoperability and compatibility among geospatial information systems should be acquired. In this paper, a technical reference model of intelligent geospatial information is proposed to show a hierarchical technical system in the field of geospatial information. The model is developed with five core research projects of Korean Land Spatialization Group (KLSG) and includes also the scope and importance of core technology in the system. The model would be helpful to manage and control all projects of KLSG.

  • PDF

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

User Activity Estimation by Non-intrusively Measurement (무구속적인 측정에 의한 사용자 활동 상태 추정 기법)

  • Baek, Jong-Hun;Yun, Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.5
    • /
    • pp.101-110
    • /
    • 2009
  • The unconscious and non-intrusive measurements of activity signals or physiological signals represent important enabling technologies for realizing a ubiquitous healthcare environment as well as a related UI. Particularly, non-intrusive measurements should be used in activity monitoring system for long-term monitoring. This paper is based on activity estimation by measuring the activity signals of a user using a handhold device with an accelerometer. The user activity estimation system (UAES) presented in this paper makes non-intrusive measurements of activity signals to minimize inconveniencing a user and to create a more practical implementation in real life. Thus, a variety of positions in which the handhold device can be carried by a user for daily use is considered, such as in the front/hip/shirt pockets, a backpack, on the waist, and in the hand.

The CloudHIS System for Personal Healthcare Information Integration Scheme of Cloud Computing (클라우드 컴퓨팅 환경에서 개인의료정보를 통합한 CloudHIS 시스템)

  • Cho, Young-Bok;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.5
    • /
    • pp.27-35
    • /
    • 2014
  • The characteristics of today's health care industry, based on the state of the art IT can be represented as a paradigm of human-oriented ubiquitous and accessible as possible by U-Health care. In addition, the healthcare industry is information and communication technologies (ICT) developments regarding the many advances and applications based on the research being carried out actively. Medical information system has been developed toward combining information systems of medical IT and it sets its sights on the fusion of developed IT and u-healthcare system. So changing distributed medical information systems into a safe PHR integrated system based on IaaS cloud computing is suggested in order to forge u-healthcare system with the times in this paper. Our experimental results show that our proposed system increased the data access time by about 24% and reduces the waiting time for processing service by about 4.3% over the web-based PHR.

New Algorithm for Arbitrary-ratio Image Resizing in DCT Domain (DCT 영역에서 영상의 임의 비율 크기 변환을 위한 새로운 알고리즘)

  • Kim, Yong-Jae;Lee, Chang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.113-123
    • /
    • 2007
  • In Ubiquitous communication environment, various conversions of images are essential, and most digital images are compressed by standard methods such as the Joint Photographic Expert Group (JPEG) and Motion Picture Expert Group (MPEG) which are based on the discrete cosine transform (DCT). In this paper, various image resizing algorithms in the DCT domain are analyzed, and a new image resizing algorithm, which shows superior performance compared with the conventional methods, is proposed. For arbitrary-ratio image resizing in the DCT domain, several blocks of $8{\times}8$ DCT coefficients are converted into one block using the conversion formula in the proposed algorithm, and the size of the inverse discrete cosine transform (IDCT) is decided optimally. The performance is analyzed by comparing the peak signal to noise ratio (PSNR) between original images and converted images. The performance of the proposed algorithm is better than that of the conventional algorithm, since the correlation of pixels in images is utilized more efficiently.

Analysis on the Organizational System of Smart Cities in Local Government (지방자치단체 스마트도시 조직체계 문제점 분석)

  • Choi, Kwangmook;Cha, Gichun;Yu, Byoungjoon;Park, Jihwan;Im, Junghyun;Park, Sehwan;Park, Seunghee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.1
    • /
    • pp.15-22
    • /
    • 2018
  • Smart City is a sustainable city that provides a variety of city services to cities that are built with a mix of construction, information and communication technologies, etc. to improve the competitiveness and quality of life of the city. In this paper, we analyze trends of domestic and foreign smart cities and the smart city organization of local governments, and describe the direction of local government's smart city organization system to realize sustainable smart city.