• Title/Summary/Keyword: ubiquitous communication

Search Result 1,214, Processing Time 0.032 seconds

Methodology for Determining RSE Spacing for Vehicle-Infrastructure Integration(VII) Based Traffic Information System (Focused on Uninterrupted Traffic Flow) (차량-인프라 연계(VII) 기반 교통정보시스템의 RSE 설치간격 결정 방법론 (연속류를 중심으로))

  • Park, Jun-Hyeong;O, Cheol;Im, Hui-Seop;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.6
    • /
    • pp.29-44
    • /
    • 2009
  • A variety of research efforts, using advanced wireless communication technologies, have been made to develop more reliable traffic information system. This study presents a novel decentralized traffic information system based on vehicle infrastructure integration (VII). A major objective of this study was also to devise a methodology for determining appropriate spacing of roadside equipment (RSE) to fully exploit the benefits of the proposed VII-based traffic information system. Evaluation of travel time estimation accuracy was conducted with various RSE spacings and the market penetration rates of equipped vehicle. A microscopic traffic simulator, VISSIM, was used to obtain individual vehicle travel information for the evaluation. In addition, the ANOVA tests were conducted to draw statistically significant results of simulation analyses in determining the RSE spacing. It is expected that the proposed methodology will be a valuable precursor to implementing capability-enhanced next generation traffic information systems under the forthcoming ubiquitous transportation environment.

A Comparison of Internet Practices between U.S. and South Korean Firms from Value Chain Perspective (한.미 기업의 인터넷 활용 비교 연구: 가치사슬을 중심으로)

  • Lee, Seog-Jun;Nam, Kyung-Doo;Koh, Chang-E.
    • Information Systems Review
    • /
    • v.6 no.2
    • /
    • pp.79-94
    • /
    • 2004
  • The Internet is now an ubiquitous technology in business and possesses the potential to make the concept of value chain into an attainable reality. We posit that the way the Internet is utilized, the extent of the Internet's impact on business performance, and the extent the firms are prepared to take advantage of the Internet varies from country to country and from industry to industry. Based on data collected from 54 firms in the U.S. and 135 in South Korea, we compared the two countries (U.S. and South Korea) and two major industry groups (manufacturing and service) regarding the pattern of Internet utilization on the Internet from a value chain perspective. The findings show that U.S. companies utilize the Internet more extensively in such areas as human resources management, automation, sales, and advertising than the South Korean counterparts. However, we did not find a statistically significant difference in the way the two countries use the Internet within a value chain model. We also compared Internet practices by industry sector (i.e., service vs. manufacturing) within each country. The results show that firms in the service sector tend to use the Internet more extensively than the manufacturing counterparts in both countries. Particularly in Korea the difference between the sectors was significant in the extent to which they utilized the Internet to support such business activities as inter-organizational alliance, communication, and marketing.

A Development of Mechanism on Supply Chain Information Recognition among intelligent equipment for USN based construction supply chain management process (차세대 지능형 건설물류관리 프로세스 지원을 위한 지능형 장비 간 물류정보인식 메커니즘 개발)

  • Kwon, Sang-Hyuk;Shin, Tae-Hong;Chin, Sang-Yoon;Kim, Yea-Sang;Kwon, Soon-Wook
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.763-766
    • /
    • 2008
  • The success of a construction project depends on efficient construction supply chain and service informationalization as types and quantities of materials in construction industry geometrically increase because the size of the construction industry increasingly becomes huge, high-rise, and complex. However, the omission of data for each step and the lower effect occurs because of uncertainty and inaccuracy of information as compared to other industries. In addition, it takes many hours to manage the present material states. Currently, IT technology and various mobile devices are being developed through the automation system of next generation intelligent construction supply chain management for the effective supply chain information management but the confusion regarding the recognition and transmission of the supply chain information between the multiple materials and transportation equipment using the IT and wireless network technology occurred. Therefore, the objective of this study is to propose the recognition mechanism which can deduce processes which caused the confusion of the recognition and transmission with supply chain information and solve the problems originated from the processes so as to solve the problems related to the confirmation and the communication of the correct supply chain information.

  • PDF

Refining Rules of Decision Tree Using Extended Data Expression (확장형 데이터 표현을 이용하는 이진트리의 룰 개선)

  • Jeon, Hae Sook;Lee, Won Don
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1283-1293
    • /
    • 2014
  • In ubiquitous environment, data are changing rapidly and new data is coming as times passes. And sometimes all of the past data will be lost if there is not sufficient space in memory. Therefore, there is a need to make rules and combine it with new data not to lose all the past data or to deal with large amounts of data. In making decision trees and extracting rules, the weight of each of rules is generally determined by the total number of the class at leaf. The computational problem of finding a minimum finite state acceptor compatible with given data is NP-hard. We assume that rules extracted are not correct and may have the loss of some information. Because of this precondition. this paper presents a new approach for refining rules. It controls their weight of rules of previous knowledge or data. In solving rule refinement, this paper tries to make a variety of rules with pruning method with majority and minority properties, control weight of each of rules and observe the change of performances. In this paper, the decision tree classifier with extended data expression having static weight is used for this proposed study. Experiments show that performances conducted with a new policy of refining rules may get better.

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Study on Context-Aware SOA based on Open Service Gateway initiative platform (OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구)

  • Choi, Sung-Wook;Oh, Am-Suk;Kwon, Oh-Hyun;Kang, Si-Hyeob;Hong, Soon-Goo;Choi, Hyun-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2083-2090
    • /
    • 2006
  • In an proposed Context-Aware SOA(Service Oriented Architecture) based OSGi(Open Service Gateway initiative) platform, Service provider manages relative kinds of services in an integrative basis from various sensors, puts each service in a SOAP (Simple Object access Protocol) message, and register thorn to the UDDI(Universal Description Discovery and Integration) server of service registry, service requester retrivel the specified kinds of services and call them to service provider. Recently most context-aware technologies for ubiquitous home network are mainly putting emphasis on RFID/USN and location-based technology. Because of this, service-oriented architecture researches have not been made enough. Under the environment of an OSGi service platform, various context-aware services are dynamically mapping from various sensors, new services are being offered for the asking of users, and existing services are changing. Accordingly, the data sharing between services provided, management of service life cycle, and the facilitation of service distribution are needed. Taking into considering all these factors, this study has suggested an Context-Aware SOA based eclipse SOA Tools Platform using OSGi platform that can transaction throughtput of more than 546 TPS of distributional Little's Law from ATAM(Architecture Tradeoff Analysis Method) while remaining stable other condition.

Plans for the Integrated Operation of Intelligent Service Facilities (지능화시설의 통합운영 방안)

  • YIM, Du-Hyun;PARK, Jeong-Woo;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.1
    • /
    • pp.127-136
    • /
    • 2017
  • U-City laws are divided into three categories: intellectual laws, information superhighway laws, and integrated operation center laws. Previous studies have suggested that efficient infrastructure operation and management is necessary in Ubiquitous-City (U-City). However, infrastructure is often interpreted differently by different laws. The purpose of this study was to plan for the integrated operation of intelligent service facilities by comprehensively analyzing the law system of domestic intelligent service facilities and problems in operation and management based on this critical mind. For this, present conditions and problems of intelligent service facilities were found through interviews with people who are in charge of the law system and other practitioners. The necessity of integrated use, including city information generated from intelligent service facilities and installment locations, has been demonstrated. Government ministries and local governments have established various information systems using ICT and U-City laws that specify integrated management and operation, but do not clearly specify definitions for the specific responsibility and authority for main agents participating in facility operation. A system is needed to smoothly mediate the relevant divisions so that they can use installed equipment simultaneously for efficient operation in generating city information. This objective of this study was to prepare a unitary law system for efficient installment and management of intelligent service facilities by establishing a logically linked relationship among the relevant laws and regulations. This will provide a foundation for a management system that has an integrated linkage of intelligent service facilities.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Development of a Real-Time Control & Management System with In-Vitro Diagnostic Medical Device for Dengue Fever (실시간 뎅기열 관리를 위한 관제시스템 개발)

  • Changsun, Ahn;Yongho, Park;Jungdae, Moon;Jongchan, Park;Youngkon, Seo;Allen, Sohn;Yoonjong, Choi;Yanghwa, Ha;Bongsu, Jung;Youngjoo, Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.77-84
    • /
    • 2023
  • Dengue virus transmission is a viral infection disease between humans and Aedes mosquitoes. Dengue is ubiquitous throughout the tropics and subtropical zones, where 1/3 of the global population live. The weather in Korea is also changing to subtropical weather, resulting in increased vulnerable Korean population to dengue virus transmission. It is important to control and prevent the dengue risk with track-recording & monitoring system. It is also required to have the control system to treat and monitor dengue patients with various cases such as regions, ages, genders according to the track-record of the disease. In this paper, we developed a Dengue Control & Prevention System, which can monitor and control dengue outbreaks in real-time with in-vitro diagnostic devices. Dengue Control & Prevention System is composed of in-vitro diagnostic device, which is a fluorescent immunoassay, and real-time monitoring system. In the future, we expect that our Dengue Control & Prevention System can be upgraded to have various disease information from Korea Disease Control and Prevention Agency for government policies and diseases control in Korea.