• Title/Summary/Keyword: ubiquitous devices

Search Result 586, Processing Time 0.022 seconds

A Study on the Application of RFID to Teaching-Learning in u-Learning Environment (u-러닝 환경에서 RFID의 교수-학습 적용에 관한 연구)

  • Baek, Jang-Hyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.185-194
    • /
    • 2007
  • With the advent of ubiquitous society, the paradigm of education is also changing. In u-learning in ubiquitous environment, mobile devices such as cellular phone, PDA, PMP, UMPC and TPC will become important learning tools. Particularly if RFID, a key technology in ubiquitous society, is utilized in teaching-learning along with mobile devices, we can expect much more meaningful learning. The present study proposed four types of application of RFID to teaching.learning, which were RFID-card, RFID-book, RFID-label and RFID-test, and examined their possibility and effectiveness. According to the results of this study, technology was insufficient to support the application of RFID-label to teaching-learning and continuous research was required for modeling the application of RFID to teaching-learning.

  • PDF

Design and Implementation of a Management Framework for Ubiquitous Home Networks (유비쿼터스 홈 네트워크를 위한 JMX 기반 관리 프레임워크의 설계 및 구현)

  • Kim, Dae-Young;Lee, Jong-Eon;Cha, Si-Ho;Cho, Kuk-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.275-284
    • /
    • 2008
  • In this paper we design and implement a management framework base on JMX to control and manage ubiquitous home networks. To do this, we organize the ubiquitous home network test-bed that consists of information electronics and sensor devices. In the test-bed network, we implement the management framework which can control and manage various applications and devices in home network environment. In addition, it can also define and add new services easily. Moreover, it is possible to provide various management interfaces with multi-protocols. The framework is formed to integrate legacy management systems readily.

A Study on Multi-Reader Management module Based On Gen2 (Gen2 기반의 다중리더기 운영모듈에 관한 연구)

  • Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.2
    • /
    • pp.155-162
    • /
    • 2008
  • The ubiquitous, which is developed for human's convenience, uses the concept of situation awareness that communicates with computer and performs a certain work without user's recognition. In order to collect the information of situation, many devices are required. Also, in the condition of ubiquitous middleware, priority is given to effective controls of various devices. There are many devices for collecting the information of situation awareness such as sensor, RFID, etc. Among them, in the use of RFID, the researcher performed the experiment, in which multiple readers were used depending on the necessity of awareness information, and found the problem of intervention between readers occurring when multiple readers are used. The paper handles the problem of intervention causing from using multiple readers and suggests middleware design module using session manager to solve the problem.

A Security Framework for Ubiquitous Computing Environment

  • Chae, Cheol-Joo;Shin, Hyo-Young;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.330-334
    • /
    • 2009
  • Most security solutions and middleware on home network consider internet users as approaching subject. It is unrealistic where the most subjects are mobile users who want to control home network devices. Therefore minor and fast certification structures are needed to control other devices with mobile device that has lower computing capacity. To solve the above problems, this paper wants to build safe certification frame work for internet and mobile users to control household devices safely. New certification structure is proposed to get out of heavy certification structure like PKI and to minimize encrypting and decrypting operation by compounding session key and public key.

Handover Protocol for Mobility Support in Ubiquitous Sensor Network (USN에서의 이동성을 위한 핸드오버 인증 프로토콜)

  • Bruce, Ndibanje;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.203-206
    • /
    • 2012
  • The System of communication with wireless devices is experiencing a huge growth. While traditional communication paradigms deal with fixed networks, mobility raises a new set of questions, techniques, and solutions. In order to realize service mobility, there is a need of protocol that can support mobility while nodes are communicating without any disruption of their connection status. This paper proposes a handover authentication protocol for mobility support. Careful considerations must be taken in priority to security issues since many unreliable public and private resources; both networks and devices are involved. The protocol is based on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy devices and forward secrecy.

  • PDF

A Rule-based Reasoning Engine supporting Hierarchical Taxonomy (계층적 분류체계를 지원하는 규칙기반 추론엔진)

  • Kim, Tae-Hyun;Kim, Jae-Ho;Won, Kwang-Ho;Lee, Ki-Hyuk;Sohn, Ki-Rack
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.148-154
    • /
    • 2008
  • In a ubiquitous computing environment, a ubiquitous smart space is required to help devices provide intelligent services. The smart space embedded with mobile devices should have the capabilities of collecting data and refining the data to contact. Unfortunately, the context information in a ubiquitous smart space has many ambiguous characteristics. Therefore, it is necessary to adapt a standard taxonomy for contact information in the smart space and to implement an inference technique of the context information based on taxonomy. Rule-based inference engine, such as CLIPS, Jess, was employed for providing situation-aware services. However, it is difficult for these engines to be used in resource limited mobile devices. In this paper, we propose a light-weight inference engine providing autonomous situation aware services in mobile environment. It can be utilized for personal mobile devices tuck as mobile phone, PMP and navigation. It can also support both generalized rules and specialized rules as using hierarchical taxonomy information.

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

Server-Aided Delegation in Ubiquitous Computing Environment

  • Shim Mi Sun;Yang Jong-Phil;Rhee Kyung Hyune
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.52-56
    • /
    • 2004
  • Computing today is becoming ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, the question rises of how to establish trust relationship in previously unknown devices or resources with such environment. After reviewing a model to delegate trust to communicating entities in ubiquitous environment and its security problems, we present a new model for secure delegation over communication entities. We adopt two-party signature scheme as cryptographic primitives. Additionally, we apply threshold cryptosystems to our model for more secure enhancement.

  • PDF

U-Learning: An Interactive Social Learning Model

  • Caytiles, Ronnie D.;Kim, Hye-jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.9-13
    • /
    • 2013
  • This paper presents the concepts of ubiquitous computing technology to construct a ubiquitous learning environment that enables learning to take place anywhere at any time. This ubiquitous learning environment is described as an environment that supports students' learning using digital media in geographically distributed environments. The u-learning model is a web-based e-learning system that could enable learners to acquire knowledge and skills through interaction between them and the ubiquitous learning environment. Students are allowed to be in an environment of their interest. The communication between devices and the embedded computers in the environment allows learner to learn while they are moving, hence, attaching them to their learning environment.