• 제목/요약/키워드: ubiquitous computing technology

Search Result 585, Processing Time 0.025 seconds

Korean Semantic Tagged Corpus Construction working (한국어 의미 표지 부착 말뭉치 구축 작업)

  • Lee, Min-Ji;Lee, Yoon-Jeong;Lee, Jung-Kuk;Kim, Jong-Dae;Park, Chan-Young;Song, Hae-Jung;Kim, Yu-Seop
    • Annual Conference on Human and Language Technology
    • /
    • 2012.10a
    • /
    • pp.99-103
    • /
    • 2012
  • 의미 역 결정 (Semantic Role Labeling)은 문장 내의 술어-논항 요소들의 의미 관계를 결정하는 과정이다. 이를 위해서는 의미 표지 부착 말뭉치가 필요하지만 한국어의 경우 이 데이터가 매우 부족한 상황이다. 본 논문에서는 한국어 Proposition Bank(이하 PropBank) 말뭉치와 세종 용언 격틀 말뭉치 구축을 위한 의미 표지 부착 작업에 대해 설명한다. 표지 부착 작업은 말뭉치의 의존 관계를 사람이 파악하여 적절한 의미 역 태그를 다는 과정이고, 이 과정으로부터 얻은 말뭉치는 의미 역 결정을 위한 기계 학습 방법론의 훈련 자료로 이용된다. 이 과정에서 필요한 구문 표지 부착 밀뭉치로는 한국전자통신연구원의 구문표지 부착 말뭉치를, 그리고 언어자원으로는 한국어 PropBank의 frame file과 세종 용언 격틀 사전을 사용한다.

  • PDF

Ubiquitous Computing Strategy and Policy (유비쿼터스 컴퓨팅 전략 및 정책)

  • Kim, Wan-Seok;Kim, Jeng-Kuk;Park, Bum-Soo
    • Journal of Digital Convergence
    • /
    • v.1 no.1
    • /
    • pp.93-112
    • /
    • 2003
  • This thesis reviewed following issues that are required in the policies and reaction strategies in the ubiquitous computing environment that continuously create domino effect of changes on the technology, services and business models. - Search for solutions in relation to timing difference of customer needs and emerging technology. - Deployment of management structure that is capable to adapt and react to environmental changes - Re-establishment or re-structuring of policies with the changes to portfolios. Thus, for the IT industry and ubiquitous computing strategies and policies which is based on intangble services and businesses that are accompanied with domino effect changes, must firstly consider above factors then establish the systematic architecture.

  • PDF

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

Study on Application Fields and Basic Characteristics of Ubiquitous Computing Technologies in a Ship (유비쿼터스 기술의 선박 적용 분야 개발 및 기초 특성 연구)

  • Cho, Seong-Rak;Paik, Bu-Geun;Park, Beom-Jin;Lee, Dong-Kon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.44 no.6
    • /
    • pp.657-665
    • /
    • 2007
  • The object of this paper is to describe the ubiquitous computing technologies for ship, which is produced and assembled by many steel blocks. It includes the testing of a 2.4GHz wireless communications platforms and radio-frequency identification technology with the blocks disturbing the wireless communication. The power line communication that is established in a ship already is also experimented for some data transfer. Also, possible application areas of the ubiquitous computing technology to ships are discussed. At last, the test bed copied from an actual vessel was installed and data acquisition tests were established using wire and wireless communication. In this paper, we implemented some ubiquitous computing technologies in the test bed simulating a ship environment and investigated the basic characteristics of ubiquitous computing technologies.

A Taxonomy of Agent Technologies for Ubiquitous Computing Environments

  • Zhang, Daqiang;Wan, Jiafu;Liu, Qiang;Guan, Xin;Liang, Xuedong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.547-565
    • /
    • 2012
  • The design, development and deployment of Mobile Agent (MA) systems for high-level inference and surveillance in wireless sensor networks and RFID systems have drawn increasing attention in the past decade. To answer how the state-of-the-art of MA in a wide range of ubiquitous and sensor environments is, this paper investigates the current progress of MA. It proposes a taxonomy, by which MA systems in ubiquitous computing environments are decomposed and discussed. Then, this paper provides insights into the strengths and weaknesses of existing efforts. Finally, it presents a series of solutions from the viewpoint of various roles of MA in ubiquitous environments and situations.

New Paradigm of e-Logistics System Management - An Proactive u-Logistics System Based on Ubiquitous Technology -

  • Hwang Heung-Suk;Cho Gyu-Sung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.05a
    • /
    • pp.153-158
    • /
    • 2006
  • The emergence of ubiquitous autonomic computing and network environment will change the service architecture information system which will be a new application area in SCM/logistics systems. In this study we surveyed the technical trend map of ubiquitous and its application in SCM/logistics support system design. We described the evolutional model of ubiquitous computing community for SCM/logistics system. It is consisted of three view points; self-growing, autonomic, and context-aware, which will allow the decision makers to be benefited from web and mobile technology and are useful for proactive SCM/logistics support system. Finally, we suggested a cooperative research planning for the development ubiquitous system between the government research center, university, and industry research activities.

  • PDF

A Study on E-trade Security Issue and Strategy in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경 하에서의 전자무역 보안 쟁점과 전략에 관한 소고)

  • Jung, Sung-Hoon;Kang, Jang-Mook;Lee, Chun-Su
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.135-156
    • /
    • 2005
  • The rapidly developed environment by ubiquitous computing make the paradigm from e-trade to u-trade. The purpose of the study is to find out issue and the strategic suggestions that could link together between the e-trade and ubiquitous computing in side of information security. The study include the contents as follows; firstly, the technical explanations under the ubiquitous computing, secondly, e-trade's risks in security technology and lastly, issue and strategic suggestions how link them together in integrated view.

  • PDF

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

A Study on the Problems and Prospects of Ubiquitous Library Through Ubiquitous Computing (유비쿼터스 컴퓨팅에 기반한 유비쿼터스 도서관의 과제와 전망에 관한 연구)

  • Noh, Dong-Jo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.2
    • /
    • pp.219-240
    • /
    • 2004
  • Ubiquitous computing technology provides anytime and anywhere accessibility to information, ubiquitous computing is adapted in the various field to increase efficiency of work. After looking into the trend of ubiquitous computing, case studies of information service using mobile service and RFID system in library were investigated in this paper. Library information service are providing retrieval of library OPAC and verifications of circulation and return date using mobile internet technology. In addition, various notice services using short me sage service(SMS) of mobile are available. Considering growing mobile service and RFID system advancement of related technology, more information service utilizing mobile service and RFID system should be developed in near future.

  • PDF