• Title/Summary/Keyword: ubiquitous devices

Search Result 586, Processing Time 0.026 seconds

The method of Deciding PC Web Important Image for Mobile Web Service (모바일 웹 서비스를 위한 PC 웹에서의 중요 이미지 결정 방법)

  • Park, Dae-Hyuck;Hong, Maria;Seo, Jeong-Man;Lee, Keun-Soo;Lim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.63-69
    • /
    • 2006
  • There are many new studies on the contents for mobile devices that are all connected to networks in a seemingly ubiquitous environment. The purpose of this paper is to propose a framework for obtaining Internet content intended for computers on mobile devices. In other words, the primary concern of this paper is to select the best images for optimal performance and convert them into images that can be effectively reproduced on mobile devices. For this, the performance of the server is to be optimized through selecting high-priority images among the many available images and converting them while considering the display pixel rates (DPR) and the image distribution areas.

  • PDF

Suggestion and Implementation of Improved Control Point for Remote Control Home-Network based on the UPnP (UPnP 기반의 홈-네트워크 원격제어를 위한 개선된 Control Point의 제안 및 구현)

  • Jeong, Jin-Gyu;Jin, Seon-Il;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.769-772
    • /
    • 2003
  • Middleware enables different networking devices and protocols to inter-operate in ubiquitous home network environments. The UPnP(Universal Plug and Play) middleware, which runs on a PC and is based on the IPv4 protocol, has attracted much interest in the field of home network research since it has versatility. The UPnP, however, cannot be easily accessed via the public Internet since the UPnP devices that provide services and the Control Points that control the devices are configured with non-routable local private or Auto IP networks. The critical question is how to access UPnP network via the public Internet. The purpose of this study is to deal with the non-routability problem in local private and Auto IP networks by improving the conventional Control Point used in UPnP middleware-based home networks. For this purpose, this paper proposes an improved Control Point for accessing and controlling the home network from remote sites via the public Internet, by adding a web server to the conventional Control Point. The improved Control Point is implemented in an embedded GNU/Linux system running on an ARM9 platform.

  • PDF

Processing of Various RFID Reader Devices for ALE Middleware (ALE 미들웨어를 위한 다양한 RFID 리더 처리 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol;Lee, Dong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.55-64
    • /
    • 2009
  • For realizing ubiquitous computing, many research activities are geared towards various areas including embedded computing, RFID, USN, home networking, context-awareness, and etc. By using the ability of RFID technology to recognize a number of objects simultaneously, more convenient ubiquitous application services are effectively provided. In this case, RFID middleware playing a role as a bridge between RFID reader devices and application services is required as well. In this paper, we propose a method of handling a number of types of RFID reader devices in ALE middleware of EPCglobal. For this, the information of connection and data protocol for a reader device is stored in a database as ontology meta-data, and used to interpret the data read by a reader device. By adding ontology data into a database, even though an RFID device newly emerges, ALE middleware can not only handle the device, but also be effectively extended through reusing ontology data, without any changes in the middleware.

Estimation of User Activity States for Context-Aware Computing in Mobile Devices (모바일 디바이스에서 상황인식 컴퓨팅을 위한 사용자 활동 상태 추정)

  • Baek Jonghun;Yun Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.1 s.307
    • /
    • pp.67-74
    • /
    • 2006
  • Contort-aware computing technology is one of the key technology of ubiquitous computing in the mobile device environment. Context recognition computing enables computer applications that automatically respond to user's everyday activity to be realized. In this paper, We use accelerometer could sense activity states of the object and apply to mobile devices. This method for estimating human motion states utilizes various statistics of accelerometer data, such as mean, standard variation, and skewness, as features for classification, and is expected to be more effective than other existing methods that rely on only a few simple statistics. Classification algorithm uses simple decision tree instead of existing neural network by considering mobile devices with limited resources. A series of experiments for testing the effectiveness of the our context detection system for mobile applications and ubiquitous computing has been performed, and its result is presented.

Security Risks Evaluation based on IPv6 Firewall Rules (IPv6의 방화벽 규칙을 기반으로한 보안위험 평가)

  • Phang, Seong-Yee;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.261-264
    • /
    • 2008
  • IPv6 has been proposed and deployed to cater the shortage of IPv4 addresses. It is expected to foresee mobile phones, pocket PCs, home devices and any other kind of network capable devices to be connected to the Internet with the introduction and deployment of IPv6. This scenario will bring in more challenges to the existing network infrastructure especially in the network security area. Firewalls are the simplest and the most basic form of protection to ensure network security. Nowadays, firewalls' usage has been extended from not only to protect the whole network but also appear as software firewalls to protect each network devices. IPv6 and IPv4 are not interoperable as there are separate networking stacks for each protocol. Therefore, the existing states of the art in firewalling need to be reengineered. In our context here, we pay attention only to the IPv6 firewalls configuration anomalies without considering other factors. Pre-evaluation of security risk is important in any organization especially a large scale network deployment where an add on rules to the firewall may affect the up and running network. We proposed a new probabilistic based model to evaluate the security risks based on examining the existing firewall rules. Hence, the network administrators can pre-evaluate the possible risk incurred in their current network security implementation in the IPv6 network. The outcome from our proposed pre-evaluation model will be the possibilities in percentage that the IPv6 firewall is configured wrongly or insecurely where known attacks such as DoS attack, Probation attack, Renumbering attack and etc can be launched easily. Besides that, we suggest and recommend few important rules set that should be included in configuring IPv6 firewall rules.

  • PDF

Development of an Ubiquitous Healthcare System based on Health Information Exchange Standards (건강정보 교환 표준에 기반한 유비쿼터스 헬스케어 시스템 개발)

  • Lee, In-Keun;Kim, Hwa-Sun;Cho, Hune
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.273-280
    • /
    • 2012
  • As changed the clinical environment, the interest on u-Healthcare service and systems has been increased. The ubiquitous healthcare(u-Healthcare) systems are constructed at the integrated environment that consists of various devices and systems basically such as personal health devices(PHDs) measuring body signals, information aggregators gathering the data transmitted from PHDs through wireless technology, and health information systems storing and managing personal health information transmitted from the information aggregators. International standards such as IEEE 11073 and HL7 have been specified for the interoperability of PHDs and health information systems, but the research on u-Healthcare systems that were developed and applied in the real clinical environment by adopting the standards was rarely conducted. Therefore, we developed an u-Healthcare system which can manage personal health information, such as blood glucose, blood pressure, and body composition, based on health information exchange standards. Moreover, we verified the stability of the developed system through clinical trial in patients with endocrine disease at the Kyungpook National University Hospital, and listed problems occurred during clinical trial and found their solutions.

Analysis and Prospects of Spatial information Technologies using Scenario based Roadmapping (시나리오기반 로드맵을 이용한 국토정보기술의 분석 및 전망)

  • Lee, Sang-Hoon;Jang, Yong-Gu;Koo, Jee-Hee
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.295-299
    • /
    • 2007
  • Today, ubiquitous technology (e.g. computers or networked devices pervade everywhere we are) has enlarged by great advancement of information and communication technologies. If ubiquitous technologies is applied to, innovation of spatial information technology is expected. traditional spatial information technologies such as survey, GIS, GPS, LBS, and RS and ubiquitous technology gradual1y have been converged. The aim of this study is to create shared visions in spatial information technologies by scenario based roadmapping. So, we surveyed the state of the art in main spatial information technologies, market status and patent map. Consequently, prospects of spatial information technologies is suggested. The aim of 1st and 2nd NGIS project focused on map supplier was to develop digital map(e.g. framework data, various thematic map). As a result, the best technology of digital mapping is achieved in the world. But, there is not enough to develop GIS and LBS solution. Current market in GIS S/W and Telematics is about 384billon won and 250billion won. a patent is applied in the order, like a USA(1571case, 47%), Japan(883case, 26%), EU(478case, 14%), Korea(446case, 13%). In the future, spatial information technology fused on ubiquitous technology will be focused on user's demand and developing convenience context. The developing target will be realtime monitoring of 3D spatial data based on high resolution coordinate system, sharing and supplying multi-sensor data considered users demand, location service by ubiquitous technologies.

  • PDF

Control of Ubiquitous Environment using Sensors Module (센서모듈을 이용한 유비쿼터스 환경의 제어)

  • Jung, Tae-Min;Choi, Woo-Kyung;Kim, Seong-Joo;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.190-195
    • /
    • 2007
  • As Ubiquitous era comes, it became necessary to construct environment which can provide more useful information to human in the spaces where people live like homes or offices. On this account, network of the peripheral devices of Ubiquitous should constitute efficiently. For it, this paper researched human pattern by classified motion recognition using sensors module data. (This data processing by Neural network and fuzzy algorithm.) This pattern classification can help control home network system communication. I suggest the system which can control home network system more easily through patterned movement, and control Ubiquitous environment by grasp human's movement and condition.

Novel Synchronization Scheme for Ubiquitous Home Network Systems (유비쿼터스 홈 네트워크 시스템을 위한 동기화 기법)

  • Kim, Yoon Hyun;Lee, Sung Hun;Hwang, Yu Min;Shin, Dong Soo;Rho, Jung Kyu;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.80-85
    • /
    • 2014
  • In this paper, we propose and analyze a novel synchronization scheme for ubiquitous home network system. In ubiquitous home network system, synchronization method is very important because many consumer electronic devices send the data simultaneously to each other through infrastructure such as access point. We employ digital watermarking sequence to improve synchronization performance without system overhead. The performance of proposed scheme is analyzed in terms of correlation performance. The results of the paper can be applied to design of various applications for ubiquitous home network systems.

Proactive Retrieval Method Using Context Patterns in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 컨텍스트 패턴을 이용한 프로액티브 검색 기법)

  • Kim, Sung-Rim;Kwon, Joon-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1017-1024
    • /
    • 2004
  • Ubiquitous system requires intelligent environment and system that perceives context in a proactive manner. This paper describes proactive retrieval method using context patterns in ubiquitous computing. And as the user's contexts change, new information is delivered proactively based on user's context patterns. For proactive retrieval, we extract context patterns based on sequential pattern discovery and association rule in data mining. By storing only information to be needed in near future using the context patterns, we solved the problem of speed and storage capacity of mobile devices in ubiquitous computing. We explain algorithms and an example. Several experiments are performed and the experimental results show that our method has a good information retrieval.

  • PDF