• Title/Summary/Keyword: ubiquitous environments

Search Result 574, Processing Time 0.026 seconds

A Customized Device Recommender System based on Context-Aware in Ubiquitous Environments (유비쿼터스 환경에서 상황인지 기반 사용자 맞춤형 장치 추천 시스템)

  • Park, Jong-Hyun;Park, Won-Ik;Kim, Young-Kuk;Kang, Ji-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.15-23
    • /
    • 2009
  • In ubiquitous environments, invisible devices and software are connected to one another to provide convenient services to users. In this environments, users want to get a variety of customized services by using only an individual mobile device which has limitations such as tiny display screens, limited input, and less powerful processors. Therefore, The device sharing for solving these limitation problems and its efficient processing is one of the new research topics. This paper proposes a device recommender system which searches and recommends devices for composing user requested services. The device recommender system infers devices based on environmental context of a user. However, customized devices for each user are different because of a variety of user preference even if users want to get the same service in the same space, Therefore the paper considers the user preference for device recommendation. Our device recommender system is implemented and tested on the real mobile object developed for device sharing in ubiquitous environments. Therefore we can expect that the system will be adaptable in real device sharing environments.

Ubiquitous Car Maintenance Services Using Augmented Reality and Context Awareness (증강현실을 활용한 상황인지기반의 편재형 자동차 정비 서비스)

  • Rhee, Gue-Won;Seo, Dong-Woo;Lee, Jae-Yeol
    • Korean Journal of Computational Design and Engineering
    • /
    • v.12 no.3
    • /
    • pp.171-181
    • /
    • 2007
  • Ubiquitous computing is a vision of our future computing lifestyle in which computer systems seamlessly integrate into our everyday lives, providing services and information in anywhere and anytime fashion. Augmented reality (AR) can naturally complement ubiquitous computing by providing an intuitive and collaborative visualization and simulation interface to a three-dimensional information space embedded within physical reality. This paper presents a service framework and its applications for providing context-aware u-car maintenance services using augmented reality, which can support a rich set of ubiquitous services and collaboration. It realizes bi-augmentation between physical and virtual spaces using augmented reality. It also offers a context processing module to acquire, interpret and disseminate context information. In particular, the context processing module considers user's preferences and security profile for providing private and customer-oriented services. The prototype system has been implemented to support 3D animation, TTS (Text-to-Speech), augmented manual, annotation, and pre- and post-augmentation services in ubiquitous car service environments.

The Voltage Compensation Strategy of Distribution System Using the Ubiquitous-based Distributed Voltage Control Method (유비쿼터스 기반 분산 자율 전압 제어 방식에 의한 배전계통 전압 보상 전략)

  • Ko, Yun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.10
    • /
    • pp.1696-1702
    • /
    • 2008
  • This paper proposes a voltage compensation device direct control strategy to realize the distributed, autonomous voltage control of the distribution system, which based on voltage data collected from customers of the remote site under the ubiquitous-based distribution system. In the proposed method, The ULTC and the SVR(Step Voltage Regulator)s compensate autonomously the voltage for self-compensation area based on the voltage data furnished from the ubiquitous device of customers. Also, the SVRs overcome the limit of single-operation of ULTC by the interlocking operation with the ULTC and enhance the voltage compensation capability for the customer. In particular, an optimization design method and a fuzzy design method are compared to determine the effective control method of the voltage compensator under the ubiquitous-based on-line operation environments. In fuzzy method, the tap of voltage compensator is defined as output member. Finally, the proposed two methods are implemented in Visual C++ MFC, the effectiveness is proved by simulation based on the worst virtual voltage data. Also, an optimal voltage compensation strategy is determined under on-line environments based on analyzed results.

Deploying Ubiquitous Traffic Flow Control System under the ITS Environments (ITS 환경에 유비쿼터스 교통관리시스템 접목 가능성 연구)

  • Park, Eun-Mi;Oh, Hyun-Sun;Suh, Euy-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.5
    • /
    • pp.36-46
    • /
    • 2011
  • It is thought traffic flow management under the ubiquitous transportation system has great potential in view of individual vehicle data availability and V2V, V2I two-way communication environments. However, it is expected that deployment of the ubiquitous transportation system takes some time. Therefore it is necessary to evaluate the feasibility of the algorithm under the ITS environment. The speed management algorithm proposed in the previous research is revised to fit for the ITS data collection and information provision environment. And the feasibility of the algorithm is evaluated through simulation experiments.

Design and Implementation of Admission Control System in Smart Space (스마트 공간을 위한 참여 제어 시스템의 설계 및 구현)

  • Yang Jong-Phil;Shim Mi-Sun;Shin Weon;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.342-352
    • /
    • 2006
  • Nowadays, Computing environment is changing to ubiquitous. In such ubiquitous computing environments, entities expect to access resources and services at any time from anywhere. Therefore, tile wily how to establish trust relationship among previously unknown devices or resources is needed under such environments. In this paper, we firstly review a model to delegate the trust to communicating entities in ubiquitous environment and its security problems(e.g., malicious right-delegation and revocation of right-delegation). Then, we design a new model for secure delegation over communication entities which is based on two-party signature scheme, and implement it.

  • PDF

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

Developing Trend of an Adaptive Mobile Terminal in Ubiquitous Sensor Network Environments (USN 환경에서 적응형 이동 단말의 개발 동향)

  • Lee, Hyun-Jae;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1027-1030
    • /
    • 2005
  • The article introduces developing trends of an adaptive mobile terminal as an interface for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. These adaptive mobile terminals able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Consequently, adaptive mobile terminals should be had respective independent hardware structure of usable wireless networks.

  • PDF

A Comparative Analysis of Geospatial Information Strategy and Ubiquitous Policy Between Korea and Japan (우리나라와 일본의 국가 GIS 추진전략 및 유비쿼터스 정책 비교분석)

  • Suh, Yong-Cheol;SaKong, Ho-Sang;Lee, Young-Joo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.2
    • /
    • pp.3-8
    • /
    • 2008
  • Informatization today has been developed in a ubiquitous environment unifying real and virtual space from digital space. To reflect on this trend, the government has promoted the u-Korea Project, which is a national strategy based on ubiquitous technology. With this national informatization policy, 'The Creation of the Infrastructure for Realization of Ubiquitous Country' for establishing a ubiquitous world is presented in the 3rd National Geographic Information System (NGIS) Master Plan, which manages national spatial information. However, we have not yet discovered distinct change for ubiquitous environments and practical technologies. The purpose of the study is to explain the current status of Ubiquitous policies and National GIS policies as a representative national information strategies directed toward the ubiquitous society by comparing Korea and Japan, and then develops improved strategies for the future.

  • PDF

Bird's-Eye View Service under Ubiquitous Transportation Sensor Network Environments (Ubiquitous Transportation Sensor Network에서 Bird's-Eye View 서비스)

  • Kim, Joohwan;Nam, Doohee;Baek, Sungjoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.225-231
    • /
    • 2013
  • A bird's-eye view is an elevated view of an object from above, with a perspective as though the observer were a bird, often used in the making of blueprints, floor plans and maps. It can be used under severe weather conditions when visibility is poor. Under low visibility environments, drivers can communicate each other using V2V communication to get each vehicle's status to prevent collision and other accidents. Ubiquitous transportation sensor networks(u-TSN) and its application are emerging rapidly as an exciting new paradigm to provide reliable and comfortable transportatione services. The ever-growing u-TSN and its application will provide an intelligent and ubiquitous communication and network technology for traffic safety area.

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF