• Title/Summary/Keyword: ubiquitous devices

Search Result 586, Processing Time 0.033 seconds

A study of ubiquitous-RTLS system for worker safety (작업자 안전관리를 위한 유비쿼터스-실시간 위치추적시스템 연구)

  • Kim, Young-Baig
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.1-7
    • /
    • 2012
  • At the industrial work site, the manufacturing process is being automated to improve work efficiency. However, it is often difficult to automate the entire manufacturing process, and there are spaces in which workers there are constantly exposed to danger. To protect such workers from the danger, this paper studied a worker safety management system for the industrial work site which uses a location recognition system and which is based on the Ubiquitous-Wireless Sensor Network (U-WSN). Using wireless signals, the distance between two devices can be measured and the location of a worker can be calculated using triangularization in 3-D. But at the industrial work sites where there are a lot of steel and structures, errors occur due to signal reflection and multi-path, etc., which makes it difficult to get the accurate location. To address this problem the following was done: first, a circular polarization patch antenna appropriate to the work site was used to reduce the degree of error that may occur from the antenna emission pattern and the particular Line of Sight (LOS); second, a 3-D localization technique and a filtering algorithm were used to improve the accuracy of location determination. The developed system was tested by using it on a wharf crane to validate its accuracy and effectiveness. The proposed location recognition system is expected to contribute greatly in ensuring the safety of workers at industrial work sites.

A Design and Implementation of A Robot Client Middleware for Network-based Intelligent Robot based on Service-Oriented (지능형 네트워크 로봇을 위한 서비스 지향적인 로봇 클라이언트 미들웨어 설계와 구현)

  • Kwak, Dong-Gyu;Choi, Jae-Young
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Network-based intelligent robot is connected with network system, provides interactions with humans, and carries out its own roles on ubiquitous computing environments. URC (Ubiquitous Robot Companion) robot has been proposed to develop network-based robot by applying distributed computing techniques. On URC robot, it is possible to save the computing power of robot client by environments, has been proposed to develop robot software using service-oriented architecture on server-client computing environments. The SOMAR client robot consists of two layers - device service layer and robot service layer. The device service controls physical devices, and the robot service abstracts robot's services, which are newly defined and generated by combining many device services. RSEL (Robot Service Executing Language) is defined in this paper to represent relations and connections between device services and robot services. A RESL document, including robot services by combining several device services, is translated to a programming language for robot client system using RSEL translator, then the translated source program is compiled and uploaded to robot client system with RPC (Remote Procedure Call) command. A SOMAR client system is easy to be applied to embedded systems of host/target architecture. Moreover it is possible to produce a light-weight URC client robot by reducing workload of RSEL processing engine.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Design and Implementation of User Authentication Protocol for Wireless Devices based on Java Card (자바카드 기반 무선단말기용 사용자 인증 프로토콜의 설계 및 구현)

  • Lee, Ju-Hwa;Seol, Kyoung-Su;Jung, Min-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.585-594
    • /
    • 2003
  • Java card is one of promising smart card platform with java technology. Java card defines necessary packages and classes for Embedded device that have small memory such as smart card Jana card is compatible with EMV that is Industry specification standard and ISO-7816 that is international standard. However, Java card is not offers user authentication protocol. In this paper, We design and implement an user authentication protocol applicable wireless devices based on Java Card using standard 3GPP Specification (SMS), Java Card Specification (APDU), Cryptography and so on. Our Java Card user authentication techniques can possibly be applied to the area of M-Commerce, Wireless Security, E-Payment System, Mobile Internet, Global Position Service, Ubiquitous Computing and so on.

A Study on the Software Fault Modes and Effect Analysis for Software Safety Evaluation (소프트웨어 안전성 평가를 위한 소프트웨어 고장 유형과 영향 분석에 관한 연구)

  • Kim, Myong-Hee;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.115-130
    • /
    • 2012
  • These days, most of safety-critical systems, which are systems those failures or malfunction may result in death or serious injury to people, or loss or severe damage to social systems, or environmental harm, are being built of embedded software or loaded controlling software systems on computers, electrical and electronic components or devices. There are a lot kind of fault analysis methods to evaluate safety of the safety-critical systems equipped computers, electrical and electronic components or devices with software. However, the only assessment method to evaluate software safety of a safety-critical system is not enough to analysis properly on account of the various types and characteristic of software systems by progress of information technology. Therefore, this paper proposes the integrated evaluation method and carries out a case study for the software safety of safety-critical system which embedded or loaded software sizes are small and control response times are not sensitive by use of two security analysis methods which are Fault Tree Analysis (FTA) and Fault Modes and Effect Analysis (FMEA) for ubiquitous healthcare system.

A Framework for Time Awareness System in the Internet of Things (사물인터넷에서 시각 정보 관리 체계)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1069-1073
    • /
    • 2016
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.

The Design and Implementation of a Platform Analyzer Model for Supporting Multi-platform Environment (다중 플랫폼 환경을 지원하기 위한 플랫폼 분석기 모델 설계 및 구현)

  • Chang, Byoung-Chol;Jung, Ho-Young;Lee, Yoon-Soo;Kim, Han-Il;Cha, Jae-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.225-233
    • /
    • 2008
  • Rapid advancement information and communication technologies has introduced various dimension of e-Learning environment such as u-learning(ubiquitous learning), m-learning(mobile learning) and t-learning(television learning). These technologies enabled learners to access learning contents through variety of devices with more flexibility and consistency. In order to implement learning through these multiple environments, basically it is necessary to acquire and process the platform information that contains properties and status of the web-accessing devices. In this study, we introduce the design and implementation of a Platform Analyzer Model which is essential for learning systems that support multi-platform environment. We also present a Interactive DTV-Centered multi-platform learning environment framework using PC, PDA or Mobile phone. Finally, we will discuss the possibility of the multi-platform learning environment with sample scenario and contents.

  • PDF

Scalable Stereoscopic Video Coding for Heterogeneous Environments (이질적인 환경을 위한 스케러블 스테레오 영상 부호화)

  • 오세찬;이영호;우운택
    • Journal of Broadcast Engineering
    • /
    • v.9 no.3
    • /
    • pp.225-235
    • /
    • 2004
  • In this paper, we propose a new stereoscopic video coding approach for heterogeneous consumer devices by exploiting the concept of spatio-temporal scalability. The proposed method uses MPEG-2 standard for coding the left or main sequence and an enhanced compatible coding scheme for predicting the P- and B-type of frames of the right or auxiliary sequence. The enhanced compatible coding scheme predicts matching block by interpolating both two forward and backward motion predicted macroblocks and disparity predicted macroblock. To provide flexible stereo video service, we define both a temporally scalable layer and a spatially scalable layer for each eye-view. The experimental results show the efficiency of proposed coding scheme by comparison with already known methods and the advantages of disparity estimation in terms of scalability overhead. According to the experimental results, we expect the proposed functionalities will play a key role in establishing highly flexible stereo video service for ubiquitous computing environment where devices and network connections are heterogeneous.

Grouping-based 3D Animation Data Compression Method (군집화 기반 3차원 애니메이션 데이터 압축 기법)

  • Choi, Young-Jin;Yeo, Du-Hwan;Klm, Hyung-Seok;Kim, Jee-In
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.461-468
    • /
    • 2008
  • The needs for visualizing interactive multimedia contents on portable devices with realistic three dimensional shapes are increasing as new ubiquitous services are coming into reality. Especially in digital fashion applications with virtual reality technologies for clothes of various forms on different avatars, it is required to provide very high quality visual models over mobile networks. Due to limited network bandwidths and memory spaces of portable devices, it is very difficult to transmit visual data effectively and render realistic appearance of three dimensional images. In this thesis, we propose a compression method to reduce three dimensional data for digital fashion applications. The three dimensional model includes animation of avatar which require very large amounts of data over time. Our proposed method utilizes temporal and spatial coherence of animation data, to reduce the amount. By grouping vertices from three dimensional models, the entire animation is represented by a movement path of a few representative vertices. The existing three dimensional model compression approaches can get benefits from the proposed method by reducing the compression sources through grouping. We expect that the proposed method to be applied not only to three dimensional garment animations but also to generic deformable objects.

  • PDF