• Title/Summary/Keyword: ubiquitous communication

Search Result 1,215, Processing Time 0.027 seconds

A Study on the Efficient TICC(Time Interval Clustering Control) Algorithm using Attribute of Node (노드의 속성을 고려한 효율적인 TICC(Time Interval Clustering Control) 알고리즘에 관한 연구)

  • Kim, Young-Sam;Doo, Kyoung-Min;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.9
    • /
    • pp.1696-1702
    • /
    • 2008
  • A MANET(Mobile Ad-hoc Network) is a multi-hop routing protocol formed by a collection without the intervention of infrastructure. So the MANET also depended on the property as like variable energy, high degree of mobility, location environments of nodes etc. Generally the various clustering technique and routing algorithm would have proposed for improving the energy efficiency. One of the popular approach methods is a cluster-based routing algorithm using in MANET. In this paper, we propose an algorithm techniques which is TICC (Time Interval Clustering Control) based on energy value in property of each node for solving cluster problem. It provides improving cluster energy efficiency how can being node manage to order each node's energy level. TICC could be able to manage the clustering, re-configuration, maintenance and detection of Node in MANET. Furthermore, the results of modeling shown that Node's energy efficiency and lifetime are improved in MANET.

Modern Concurrent Programming for Multicode Environment (멀티코어 환경을 위한 현대 동시성 프로그래밍)

  • Kim, Nam-gue;Kang, Young-Jin;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.589-592
    • /
    • 2016
  • The period of the previous multi-core could be helped to improve program performance, based on the development of the hardware. However, one of the core performance enhancements for this encounter limitations and become the common way of multi-core with multiple cores. Modern programming concurrency that improves the conventional method for using threads of the kernel level in order to use the multi-core come to the fore. Using modern lightweight thread concurrency programming is to optimize the benefits of multi-core. Also sharing the absence of available data that can change is a major consideration when writing concurrent code. This paper describes the key considerations when creating a discussion concurrent code, and these issues are being supported in any way in the language of one 'go' of technologies that support the modern concurrency, and even how to write better code concurrency.

  • PDF

ILOCAT: an Interactive GUI Toolkit to Acquire 3D Positions for Indoor Location Based Services (ILOCAT: 실내 위치 기반 서비스를 위한 3차원 위치 획득 인터랙티브 GUI Toolkit)

  • Kim, Seokhwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.866-872
    • /
    • 2020
  • Indoor location-based services provide a service based on the distance between an object and a person. Recently, indoor location-based services are often implemented using inexpensive depth sensors such as Kinect. The depth sensor provides a function to measure the position of a person, but the position of an object must be acquired manually using a tool. To acquire a 3D position of an object, it requires 3D interaction, which is difficult to a general user. GUI(Graphical User Interface) is relatively easy to a general user but it is hard to gather a 3D position. This study proposes the Interactive LOcation Context Authoring Toolkit(ILOCAT), which enables a general user to easily acquire a 3D position of an object in real space using GUI. This paper describes the interaction design and implementation of ILOCAT.

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

A DEVELOPMENT OF INTELLIGENT CONSTRUCTION LIFT-CAR TOOLKIT DEVICE FOR CONSTRUCTION VERTICAL LOGISTICS MANAGEMENT

  • Chang-Yeon Cho;Soon-Wook Kwon;Tae-Hong Shin;Sang-Yoon Chin;Yea-Sang Kim;Joo-Hyung Lee
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.242-249
    • /
    • 2009
  • High-rise construction sites, especially those situated in spatially constrained urban areas, have difficulties in timely delivery of materials. Modern techniques such as Just-in-time delivery, and use of information technology such as Project Management Information System (PMIS), are targeted to improve the efficiency of the logistics. Such IT-driven management techniques can be further benefited from state-of-the-art devices such as Radio Frequency Identification (RFID) tags and Ubiquitous Sensor Networks (USN), which has resulted in notable achievements in automated logistics management at the construction sites. Based on those achievements, this research develops USN hardware toolkits for construction lifts, which aims to be automated the vertical material delivery by sensing the material information and routing it automatically to the right place. The gathered information from the sensors can also be used for monitoring the overall status. The developed system will be tested in the actual high-rise construction sites to assess the system's feasibility. The proposed system is being implemented using Zigbee communication modules and RFID sensor networks which will communicate with the intelligent palette system (previously developed by the authors). To support the system, a lift-mountable intelligent toolkit is under development. Its feasibility test will be conducted by applying the implemented system to a test bed and then analyzing efficiency of the system and the toolkit. The collected test data will be provided as a basis of autonomous vertical transport equipment development. From this research, efficient management of the material lift is expected with increased accuracy, as well as better management of overall construction schedule benefited from the system. Further research will be expected to develop a smart construction lift, which will eliminate the need for human supervision, thus enabling a real 'autonomous' operation of the system.

  • PDF

The Study on Impact of Introduction Characteristics Factor of EMR System on Perceived Usefulness and Ease of Use and Behavioral Intention to Use (EMR시스템의 도입 특성요인이 지각된 유용성, 편이성 및 사용의도에 미치는 영향에 관한 연구)

  • Im, Hyung-Joo;Shim, Jeong-Taek;Lee, Sang-Shik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.32-50
    • /
    • 2009
  • Since 1990 when order communication system(OCS) was first introduced, the use of information technology in medical service has been widely accepted in order to enhance quality and customer relationship as well as to increase managerial efficiency. Medical information system is rapidly increasing and is trying to make ubiquitous healthcare environment through telemedicine system. Especially, medical profession and government have taken interest in electronic medical record (EMR) system which can digitalize and manage all medical records in hospitals. By recording patient's medical information in real time, EMR system can improve service efficiency and customer service quality including short waiting time, various utilization of clinic information, and reduced cost.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

A Study on 3D RTLS at Port Container Yards Using the Extended Kalman Filter

  • Kim, Joeng-Hoon;Lee, Hyun-Woo;Kwon, Soon-Ryang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.228-235
    • /
    • 2007
  • The main purpose of this paper is to manage the container property effectively at the container yard by applying the RTLS technology to the field of port logistics. Yet, many kinds of noises happen to be inputted with the distance value(between the reader and the tag) which is to be inputted into the location identification algorithm, which makes the distance value jumped due to the system noise of the ultrasonic sensor module and the measurement noise. The Kalman Filter is widely used to prevent this jump occurrence; the noises are eliminated by using the EKF(Extended Kalman Filter) while considering that the distance information of the ultrasonic sensor is non-linear. Also, the 3D RTLS system at the port container yard suggested in this research is designed not to be interrupted for its ultrasonic transmission by positioning the antenna at the front of each sector of the container where the active tags are installed. We positioned the readers, which function as antennas for location identification, to four places randomly in the absolute coordinate and let the positions of the active tags identified by using the distance data delivered from the active tags. For the location identification algorithm used in this paper, the triangulation measurement that is most used in general is applied and newly reorganized to calculate the position of the container. In the first experiment, we dealt with the error resulting in the angle and the distance of the ultrasonic sensor module, which is the most important in the hardware performance; in the second, we evaluated the performance of the location identification algorithm, which is the most important in the software performance, and tested the noise cancellation effects for the EKF. According to the experiment result, the ultrasonic sensor showed an average of 3 to 5cm error up to $45^{\circ}$ in case of $60^{\circ}$ or more, non-reliable linear distances were obtained. In addition, the evaluation of the algorithm performance showed an average of $4^{\circ}{\sim}5^{\circ}$ error due to the error of the linear distance-this error is negligible for most container location identifications. Lastly, the experiment results of noise cancellation and jump preservation by using the EKF showed that noises were removed in the distance information which was entered from the input of the ultrasonic sensor and as a result, only signal was extracted; thus, jumps were able to be removed and the exact distance information between the ultrasonic sensors could be obtained.