• Title/Summary/Keyword: ubiquitous convenience

Search Result 110, Processing Time 0.025 seconds

Research on Classification of Monitoring Items for the Integrated Management of the Underground Facilities (지하시설물 통합관리를 위한 모니터링 항목 분류에 관한 연구)

  • Kim, Jung-Hoon;Min, Kyung-Ju;Lee, Mi-Sook;Lim, Si-Yeong
    • Spatial Information Research
    • /
    • v.18 no.1
    • /
    • pp.19-26
    • /
    • 2010
  • It is important to manage the underground facilities efficiently because they are directly related to the convenience and safety of citizens. But the fact that the different agencies take on a role of managing the underground facilities respectively makes it impossible. So Korean government has exerted great efforts to solve this problem through several projects. Korean government expects that the ubiquitous technologies such as sensor and wireless communication in the domain of the underground facilities management will be useful. It is main duty of u-City Management Center to monitor several situations about the underground facilities using ubiquitous technologies. But there is no consensus about what concrete situations it has to monitor even though u-cities under construction. Because local governments or related companies are in charge of carrying out these roles yet, there is no legal basis on which to do these tasks by the center. And it is needed to develop new technologies for u-services efficiently. Because technologies for u-service are vast, various and converged, so it necessary to develop them according to priority or in cooperation with other developers. In this paper, we classify the monitoring items for each facility which were investigated by a recent research. It is expected to make use of defining the role of the center and developing technologies with u-service.

IT Convergence u-Learning Contents using Agent Based Modeling (에이전트 기반 모델링을 활용한 IT 융합 u-러닝 콘텐츠)

  • Park, Hong-Joon;Kim, Jin-Young;Jun, Young-Cook
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.513-521
    • /
    • 2014
  • The purpose of this research is to develope and implement a convergent educational contents based on theoretical background of integrated education using agent based modeling in the ubiquitous learning environment. The structure of this contents consists of three modules that were designed by trans-disciplinary concept and situated learning theory. These three modules are: convergent problem presenting module, resource of knowledge module and learning of agent based modeling and IT tools module. After the satisfaction survey of the implemented content, out of 5 total value, the average value was 3.86 for effectiveness, 4.13 for convenience and 3.86 for design. The result of the survey shows that the users are generally satisfied. By using this u-learning contents, learners can experience and learn how to solve the convergent problem by utilizing IT tools without any limitation of device, time and space. At the same time, the proposal of structural design of contents can be a good guideline to the researchers to develop the convergent educational contents in the future.

Study on the developmental directions of Mobile contents for Mobile e-learning prosumers in Web 2.0 decade (웹 2.0시대 모바일 이-러닝 컨텐츠 소비자의 컨텐츠 활용 확장성 연구)

  • Ahn, Kyung-Whan
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.41-51
    • /
    • 2008
  • In a circumstance that the development of mobile media through the on-line consumer desire in the era of Web 2.0 has promoted extension of personal mobile media on the part of consumers, this study examined consumer trends depending on use of e-learning contents through mobile media. In connection with tendencies through mobile prosumers' consumption patterns and use of mobile educational contents, I analyzed user demands based on characteristics of personal media centering around a communities of e-learning portals. Direction of e-learning technological development calls on mobile communication companies to open their networks and share platform following digital convergence. E-learning contents should be produced in a custom-made way for the personal media. This study is aimed at contributing for advancement of e-learning contents consumers' user convenience implicating examination into consumer demands which are necessary to invigorate e-learning contents.

  • PDF

Proposed image encryption method using PingPong256

  • Kim, Ki-Hwan;Lee, Hoon Jae;Lee, Young Sil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.71-77
    • /
    • 2020
  • In this paper, we propose a method in which PingPong256 combines LFSR and variable clock to generate an irregular PRNG and use it for image encryption. PingPong256 is guaranteed an extended period based on the two LFSRs, and the variable clock is a structure that outputs the result of operating a predetermined clock in one operation by referring to the state of the different LFSR. A variable clock is characterized by the difficulty of predicting the output at any time because the choice increases with time. PingPong256 combines the advantages of LFSR and variable clock, the convenience of hardware and software implementation, and the benefits of sensitivity and irregular periods. Also, the statistical safety was verified using the NIST SP800-22, the safety of the proposed method, and the sensitivity of the image change was tested using NPCR and UACI.

A Study on the Security of One-Time Keypad (OTK) (원타임 키패드의 보안성 분석)

  • Kim, Jon-Lark;Lee, Nari;Roe, Young Gun;Galvez, Lucky Erap
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.731-742
    • /
    • 2017
  • For all the various cryptographic techniques related to security, social technological attacks such as a shoulder surfing are infeasible to block off completely. Especially, the attacks are executed against financial facilities such as automated teller machine(ATM) which are located in public areas. Furthermore, online financial services whose rate of task management is consistently increasing are vulnerable to a shoulder surfing, smudge attacks, and key stroke inference attacks with google glass behind the convenience of ubiquitous business transactions. In this paper, we show that the security of ATM and internet banking can be reinforced against a shoulder surfing by using One-Time Keypad(OTK) and compare the security of OTK with those of ordinary keypad and One-Time Password(OTP).

A Survey of Portal Sites in Terms of Academic Information Retrieval (검색 포털 시스템의 동향과 발전방향)

  • Lee, Jee-Yeon;Park, Sung-Jae
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.71-89
    • /
    • 2005
  • This paper examines the ways of using information resources available through information retrieval systems of portal sites. We analyze the types of information resources, search capabilities, and interfaces of Naver, Empas, and Google Scholar. Naver's retrieval system sells research reports, papers, patents information, etc. to users, which is similar to C2C(Customer to Customer in e-commerce environment). Empas provides information from journals, research reports, and proceedings with no charge. Google Scholar's noteworthy efforts are their collaborative programs with and/or for major U.S. libraries, such as "Library Link" and "Library Project." Considering the extended information retrieval services of portals, especially the services like Google Scholar's library programs, libraries need to develop more specialized services, such as the customized information service for individual user, development of user convenience tools like OCLC WorldCat, more accessibility through ubiquitous library concept, and collaboration among libraries.

A Study on Development of the Intelligent Bridge Maintenance System Using RFID (RFID를 이용한 지능형 교량 유지관리 시스템 개발에 관한 연구)

  • Jo, Byung-Wan;Lee, Yun-Sung;Kim, Heon;Lee, Dong-Woon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2107-2124
    • /
    • 2013
  • The inspections that are being done on current bridges in our country are made to go through a process of being recorded on the management system and then converted by the computer. This has deteriorated the credibility of manual-analog types of data, inefficient care of information, and produced potential problems of the structures of bridges through subjective evaluations. In order to solve these troubles, this research has aimed at effectiveness, management, and convenience so that the inspector at the actual scene of the bridge structures will be able to achieve the primary purpose of infrastructure safety through precise supervision. To assist this, this study has suggested a state of the art IT intellectual management system that has applied RFID. This system has been designed to decrease the inspecting time on the actual scene, which will provide more time for efficient inspection and by using the converted DB, managing and utilizing high quality data will come naturally and through the objective evaluation, it will be possible to make exact judgments of the structures of the bridge. Also, regardless of the location, it has been found that the work performance was excellent through highly effective management.

Mobile Healthcare System Based on Bluetooth Medical Device

  • Kim, Jeong-Heon;Lee, Seung-Chul;Lee, Boon-Giin;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.21 no.4
    • /
    • pp.241-248
    • /
    • 2012
  • Recently healthcare industry such as pharmaceutical, medical device and healthcare service technology is growing significantly. Mobile healthcare has attracted big attention due to IT convergence technology. Paradigm of healthcare has been changed from the 1st generation(communicable disease prevention) and the 2nd generation(treatment of disease due to extended life expectancy) to the 3rd generation(extended life expectancy due to prevention and control). In our study, we suggest the 3rd generation mobile healthcare system using Bluetooth based wearable ECG monitoring system and smart phone technology. The mobile healthcare system consists of wearable shirts with Bluetooth communication module, ECG sensor, battery, and mobile phone. The ECG data is obtained by a miniaturized sensor and the data is transferred to a mobile phone using Bluetooth communication. Then, user can monitor his/her own ECG signal on an application using Android in mobile phone. The Bluetooth communication device is used due to highly reliable data transmission property and the Bluetooth chip is embedded in every mobile phone. The wearable shirts with chest belt of Bluetooth ECG module is designed with a focus on convenience in the daily life of a wearer. The ECG signal evaluation software in Android based mobile phone is developed for the health check and the ECG signal variation is tested according to the activities of the wearer such as walking, climbing stairs, stand up and sit down, and so on.

Design for the Multimedia Messaging Engine for Electronic Traffic Administration Services (전자교통행정서비스를 위한 멀티미디어 메시징 엔진의 설계)

  • Kung Sang-Hwan;Koh Hyon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.10-19
    • /
    • 2005
  • It may not be strange to anticipate that the forth-coming epoch of electronic government would bring us lots of convenience on account of ubiquitous environment with mobile devices. Such environment enables us to access the up-to-date information anytime and also a worker to carry out administration services to perform one's line of duty at anytime with electronic, handy devices such as PDA. What we now recognize from the field of electronic traffic administration services is that the office work flow as well as the public services has been remarkably improved by using of not only text but video and image information under the distributed, mobile environment. One of key requirements of this kinds of services is the feature of exchanging various information among multiple information publishers and subscribers. We call this feature Messaging Services generally The study in this paper focuses on the architecture design of the Messaging Engine software, complying with the pattern-oriented software architecture design methodology. And our contribution also goes to the discovery of three architecture patterns found in the design process and the efficient multi-threading architecture compared to one of the Messaging Engine solutions.

  • PDF

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.