• Title/Summary/Keyword: ubiquitous communication

Search Result 1,215, Processing Time 0.029 seconds

Analysis on the Organizational System of Smart Cities in Local Government (지방자치단체 스마트도시 조직체계 문제점 분석)

  • Choi, Kwangmook;Cha, Gichun;Yu, Byoungjoon;Park, Jihwan;Im, Junghyun;Park, Sehwan;Park, Seunghee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.1
    • /
    • pp.15-22
    • /
    • 2018
  • Smart City is a sustainable city that provides a variety of city services to cities that are built with a mix of construction, information and communication technologies, etc. to improve the competitiveness and quality of life of the city. In this paper, we analyze trends of domestic and foreign smart cities and the smart city organization of local governments, and describe the direction of local government's smart city organization system to realize sustainable smart city.

A Study on General Network Framework for Service Mobility (서비스 이동성을 위한 일반적인 네트워크프레임워크 연구)

  • You, Tae-Wan;Lee, Seung-Yun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2069-2074
    • /
    • 2006
  • The Next generation network may describe one integrated network by IP (Internet Protocol) convergence and combining various access technologies. The IP version 6 (IPv6) becomes fundamental protocol and the terminal offered various services is having mobility, multihoming, and intelligent as well as smaller. In this convergence network, which integrate mobile network, broad cast network, and Internet as well as PSTN, can provide all of the service. In this context, we will briefly present that the end node should be required ubiquitous computing and networking. That is to say that we must guarantee the end node in any time, my place, my where, and offer continuously services to the node. As like this, Service Mobility is given if a user can obtain subscribed and personalized services consistently even if connected to a foreign network service provider. In other words, Service mobility allows users to maintain access to their services even while moving or changing devices and network service providers. In this paper, we have to refer technical consideration items to make the service mobility framework.

Energy Saving Algorithm of the Home Gateway considering Service Usage Patterns (서비스 사용 패턴을 고려한 홈 게이트웨이의 전력 절감 알고리즘)

  • Kong, In-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1792-1798
    • /
    • 2010
  • Home Gateway is always on for continuous services of home networks. Ubiquitous home networks are extended. so power consumption of home gateways increases by geometric progression. Our algorithm is for home gateway to sleep, listen or wakeup according to network traffic adaptively, as well as to keep always-on service. To do this, it traces the accumulated average of previous sleep periods. In addition to this basic algorithm, we make the profiles for user's living pattern per the day to reflect network usages in detail and adaptively. As the simulation results by comparing with overall accumulated average and per-day accumulated average, in case of the overall accumulated average, the difference the estimation and real value is distributed from 0.43% to 4%. In contrast of this, in case of the per-day accumulated average is distributed from 0.06% to 2%. From this results, we know the profiling of per-day usage pattern can help reduce the difference of the real sleep period and the estimated sleep period.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

Development of a real-time Analysis System of Microchip Fluorescence Images based on Server-Client (서버 클라이언트 기반의 실시간 마이크로칩 형광 이미지 분석 시스템 개발)

  • Cho, Migyung;Shim, Jaesool
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1239-1244
    • /
    • 2013
  • In the field of clinical medicine and research, the analysis of such as protein and DNA at the molecular level and even at the cell level are necessary for disease diagnosis and treatment. In many cases, a real time image of samples is needed for the accurate analysis and manipulation of samples since experimental samples are degenerated with time. In this research, a three-dimensional fluorescence microscope device was developed for taking images of protein and DNA inside a single cell and the server-client based image analysis system was made for an integrated management of the real-time images taken from the microscope device. The system consists of a fluorescent measurement device, the associated software and a client program on smartphone. The developed system allows doctors or experimental managers to receive and look at the real-time experimental images taken from the samples of patients anywhere in the emergency, to analyze results and to instantly diagnose the disease and to transfer the results to the patients. As a result, the system is able to be utilized in the implementation of ubiquitous health as well.

An Efficient Data Dissemination Protocol for Cluster-based Wireless Sensor Networks (클러스터 기반의 무선 센서네트워크에서 통신량을 줄인 데이터 보급방법)

  • Cho, Ji-Eun;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.3
    • /
    • pp.222-230
    • /
    • 2009
  • A sensor network is an important element of the ubiquitous and it consists of sensor fields that contain sensor nodes and sink nodes that collect data from sensor nodes. Since each sensor node has limited resources, one of the important issues covered in the past sensor network studies has been maximizing the usage of limited energy to extend network lifetime. However, most studies have only considered fixed sink nodes, which created various problems for cases with multiple mobile sink nodes. Accordingly, while maintaining routes to mobile sink nodes, this study aims to deploy the hybrid communication mode that combines single and multi-hop modes for intra-cluster and inter-cluster transmission to resolve the problem of failed data transmission to mobile sink nodes caused by disconnected routes. Furthermore, a 2-level hierarchical routing protocol was used to reduce the number of sensor nodes participating in data transmission, and cross-shape trajectory forwarding was employed in packet transmission to provide an efficient data dissemination method.

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

Design and Implementation of Realtime Information Service based on Ubiquitous Sensor Network Using MySQL and Tiny-DB (Tiny-DB와 MySQL을 이용한 유비쿼터스 센서 네트워크 기반의 실시간 정보 서비스 설계 및 구현)

  • Kang, Kyoung-Ok;Kim, Yong-Woo;Kwon, Hoon;Kim, Bu-Rim;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.175-181
    • /
    • 2006
  • Wireless sensor network forms the self-organization network, and transfers the information among sensor nodes that have computing technology ability and wireless communication ability. The recent sensor network is study for low-power, micro, low cost of node is proceeded. Recently, the research of application services in wireless sensor networks is proceeded. Therefore, in this paper, we design the prototype of the real-time information service that support a user the information of temperature, illumination etc. And, we implement the alarm application service fer the disaster prevention on Internet base on IPv4/IPv6. We develop the module of the extract information using the query processing based on TinyOS, and the module of the server's database using MySQL data base management system and JDBC. Additionally, we develop the client module that receive the real-time sensing data using ODBC in Internet based on IPv4/IPv6.

  • PDF

Development of Mobile Sage-math and its use in Linear Algebra (모바일 환경에서의 Sage-Math의 개발과 선형대수학에서의 활용)

  • Ko, Rae-Young;Kim, Duk-Sun;Bak, Jin-Yeong;Lee, Sang-Gu
    • Communications of Mathematical Education
    • /
    • v.23 no.4
    • /
    • pp.1023-1041
    • /
    • 2009
  • The importance of the mathematical education on the ICT environment has been increased as the educational environment has been changed in 21st century. In Korea, many researches on ICT tools have appeared over the last 10 years. But most of researches are depending on the foreign tools, that was one major obstacle on adapting them in our mathematics curriculum. But we found the new open source tool which is called Sage-Math can be in effective solution to resolve those problems. Now we produce what we have done in linear algebra with this Sage-Math and mobile modules.

  • PDF

Practical Password-Authenticated Three-Party Key Exchange

  • Kwon, Jeong-Ok;Jeong, Ik-Rae;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.6
    • /
    • pp.312-332
    • /
    • 2008
  • Password-based authentication key exchange (PAKE) protocols in the literature typically assume a password that is shared between a client and a server. PAKE has been applied in various environments, especially in the “client-server” applications of remotely accessed systems, such as e-banking. With the rapid developments in modern communication environments, such as ad-hoc networks and ubiquitous computing, it is customary to construct a secure peer-to-peer channel, which is quite a different paradigm from existing paradigms. In such a peer-to-peer channel, it would be much more common for users to not share a password with others. In this paper, we consider password-based authentication key exchange in the three-party setting, where two users do not share a password between themselves but only with one server. The users make a session-key by using their different passwords with the help of the server. We propose an efficient password-based authentication key exchange protocol with different passwords that achieves forward secrecy in the standard model. The protocol requires parties to only memorize human-memorable passwords; all other information that is necessary to run the protocol is made public. The protocol is also light-weighted, i.e., it requires only three rounds and four modular exponentiations per user. In fact, this amount of computation and the number of rounds are comparable to the most efficient password-based authentication key exchange protocol in the random-oracle model. The dispensation of random oracles in the protocol does not require the security of any expensive signature schemes or zero-knowlegde proofs.