• 제목/요약/키워드: user location and tracking

검색결과 142건 처리시간 0.027초

TDoA 기반의 위치 추정을 위한 초정밀 시각동기에 관한 연구 (A Study of High-Precision Time-Synchronization for TDoA-Based Location Estimation)

  • 김재완;엄두섭
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제2권1호
    • /
    • pp.7-14
    • /
    • 2013
  • 현재 위치인식에 관한 많은 기술들이 존재한다. 하지만 서로 다른 곳에 위치한 신호수신장치들이 먼 곳에 위치한 특정 물체의 위치를 정확하게 알아내기 위해서는 해당 물체 또는 사용자의 단말장치에서 내보내는 신호의 정확한 시간을 알아야 한다. 이러한 목적 때문에 ToA 기술보다는 TDoA 기술이 보다 적합하다. TDoA 기술을 기본으로 하는 전자 감시 시스템 및 다른 위치추적 장치들은 이격 장치들간의 정밀한 시각동기가 되지 않아서 신호수신장치들에 의해 보내지는 신호로부터 정확한 TDoA 값을 획득하는 것이 불가능하다. 이렇게 직접적으로 정확한 값을 받지 못함으로써 위치 추정 에러가 발생된다. 이러한 이유로 이격 장치들간의 정밀한 시각동기 기술은 TDoA를 기반으로 하는 위치인식에 있어서 필수적인 것이다. 본 논문에서는 TDoA를 기반으로 하는 위치인식을 위해, 제안된 정밀한 시각동기 기술의 정확성과 측정오차가 평가된다. TDoA를 기반으로 하는 위치 측정 오차는 제안하는 시각동기 알고리즘을 사용할 때 크게 향상된다.

U-마켓에서의 사용자 정보보호를 위한 매장 추천방법 (A Store Recommendation Procedure in Ubiquitous Market for User Privacy)

  • 김재경;채경희;구자철
    • Asia pacific journal of information systems
    • /
    • 제18권3호
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

상호인증을 제공하는 개선된 RFID 인증 프로토콜 (Improved RFID Authentication Protocol Providing Mutual Authentication)

  • 전서관;은선기;오수현
    • 대한전자공학회논문지TC
    • /
    • 제47권2호
    • /
    • pp.113-120
    • /
    • 2010
  • RFID 시스템은 비접촉식 무선 인식 기술로 유통 및 물류, 환경, 교통, 보안 분야 등 산업 전반에 걸쳐 다양하게 활용되고 있다. 그러나 RFID 통신 환경의 제약적인 특징에 의하여 프라이버시 문제를 비롯한 여러 가지 보안 문제가 제기되면서 이를 해결하기 위한 많은 기술들이 연구되고 있다. 최근 들어 Shin과 Park은 프라이버시를 보호하고 해쉬 함수와 배타적논리합(XOR) 연산을 이용하는 효율적인 RFID 인증 프로토콜을 제안하였다. 그러나 Ahn과 Bu 등은 Shin과 Park이 제안한 인증 프로토콜의 문제점이 있음을 지적하고 이를 개선하여 좀 더 안전하고 효율적인 인증 프로토콜을 제안하였다. 그러나 Ahn과 Bu 등이 제안한 인증 프로토콜들은 리더와 태그 사이의 상호인증이 완벽하게 이루어지지 않아 악의적인 리더로의 위장이 가능하다는 문제점이 있다. 본 논문에서는 이러한 문제점을 해결하기 위해 상호인증을 제공하는 개선된 RFID 인증 프로토콜을 제안한다. 제안하는 RFID 인증 프로토콜은 리더와 태그 간 상호인증을 제공하며 재전송 공격과 스푸핑 공격에 대해 안전하고, 태그의 익명성 보장 및 악의적인 리더들의 공모에 의한 위치 트래킹에 대해 안전하다는 장점이 있다.

공간정보기반 지능형 방범서비스 어플리케이션 개발 (A Method on the Implementation of Intelligent Security Service Application based on Spatial Information)

  • 최우철;나준엽
    • Spatial Information Research
    • /
    • 제23권6호
    • /
    • pp.89-98
    • /
    • 2015
  • 본 연구에서는 공간정보를 활용하여 구현가능한 방범 관련 기능 및 서비스를 평가할 수 있는 기준을 도출하고, 도출된 기준별 상대적 중요도를 계산하여 최종적으로 공간정보 기반 지능형 방범서비스 어플리케이션의 적용 기능/서비스 대안에 대한 우선순위를 제시하였다. 또한 현재 정부 및 지자체 주도하에 운영 중인 10여개의 국민안심서비스의 연계방안과 세부 서비스 구현방안을 함께 제시함으로써 실질적인 사업화 및 실증화가 가능한 공간정보 기반 지능형 방범 앱서비스 모델을 제시하였다. 최종 평가기준은 1계층에 속하는 3가지와 2계층에 속하는 12가지의 평가기준에 따라 AHP 중요도 평가분석을 수행하였으며, 이를 토대로 긴급상황 시 대처방안, 보호자 실시간 위치파악 및 미아/치매환자전용 단말 사용, 사용자 참여 및 정보제공 등의 지능형 방범서비스 어플리케이션 구현방안을 모색하였다.

어린이 도서관의 공간계획에 관한 연구: 어린이의 연령 단계별 공간이용 실태를 중심으로 (A Study on Spatial Planning of Children's Library: Focused on the Aspect of Space Use According to the Age Step of Children)

  • 이정미;곽철완
    • 한국도서관정보학회지
    • /
    • 제36권4호
    • /
    • pp.177-198
    • /
    • 2005
  • 본 연구는 다양한 연령층의 이용자를 서비스대상으로 하는 어린이 도서관 및 어린이실의 공간계획을 위한 기초적 데이터를 제시하는데 그 목적이 있다. 연구방법은 체류자 점유조사와 행동관찰조사를 통하여 서로 다른 공간유형을 갖는 4개의 어린이실의 어린이와 동반가족을 대상으로 데이터를 수집하여 이를 공간구성의 특성에 비추어 분석하는 방법을 사용하였다. 조사 결과를 크게 다섯 가지로 요약할 수 있다. 첫째, 도서관의 입지 조건과 이용자 속성이 어린이실 면적 규모를 결정하는데 영향을 미치고 있었다. 둘째, 어린이실에는 어린이 이외의 다양한 연령층이 이용하고 있었다. 셋째, 어린이는 연령 단계별로 서로 다른 행동 패턴을 나타내고 있었다. 넷째, 각 영역별로 다양한 독서환경을 조성할 필요가 있다. 다섯째 가족, 형제 및 친구와 같은 그룹 이용과 단독 이용에 의해 선택되어지는 체류 장소에서 주로 보이는 행위의 내용과 공간 및 가구의 특성을 공간계획을 위한 키워드로 정리하여 제시하였다.

  • PDF

해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상 (Security Enhancing of Authentication Protocol for Hash Based RFID Tag)

  • 전진오;강민섭
    • 인터넷정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.23-32
    • /
    • 2010
  • 본 논문에서는 해쉬 기반 RFID 태그를 위한 보안성이 향상된 인증 프로토콜을 제안하고, 제안한 인증 프로토콜 기반으로 한 RFID 태그의 디지털 코덱을 설계한다. 제안한 프로토콜은 태그와 back-end 서버 사이에서 3-way 질의 응답 인증 프로토콜을 기본으로 하고 있으며, 안전한 인증 메커니즘을 구현하기 위해, ISO/IEC 18000-3 표준에서 규정된 3가지 타입의 프로토콜 패킷을 개선된 형태로 수정한다. 제안한 방법은 Man-in-the-middle과 Replay attacks과 같은 능동 공격의 방어에 특히 유효하다. 제안된 프로토콜의 효과를 검증하기 위하여 RFID 태그에서의 디지털 코덱은 Verilog HDL을 사용하여 설계하였고 Hynix $0.25\;{\mu}m$ standard-cell library을 갖춘 Synopsys Design Compiler을 이용하여 합성하였다. 보안 분석 및 실험결과를 통해, 본 논문에서 제안된 방법이 사용자의 데이터 보안, 태그 익명성, Man-in-the-middle attack 예방, replay attack, 위조방지 및 위치 추적 등에 서 성능이 개선됨을 보였다.

스마트 건설안전 기술 도입 촉진을 위한 제도적⋅기술적 개선 방안에 관한 연구 (Institutional and Technical Improvement Measures to Facilitate the Use of Smart Construction Safety Technology)

  • 정재현;박상일;심형택;김유희
    • 한국안전학회지
    • /
    • 제39권1호
    • /
    • pp.41-54
    • /
    • 2024
  • Efforts to reduce on-site safety incidents have expanded, leading to active research in this domain. However, a systematic analysis to improve the utility of technology is lacking. In this study, we conducted a survey on the various institutional and technical improvement measures to promote the application of smart construction safety technology over three years after the implementation of the "Smart Safety Equipment Support Project." The results showed that financial constraint was the primary obstacle in the adoption of this innovation. Fostering a flexible environment in the utilization of management fees and financial support of projects was determined to aid in the extensive application of the technology. Ensuring cost efficiency and user-friendliness were principally necessary for technical enhancements in the smart construction safety technology. Technologies, such as VR/AR safety education, real-time location tracking, wearable devices, and innovation on streamlining safety-related work efficiency, had been anticipated to contribute to on-site safety. Operating a smart safety control center was expected to be beneficial in the systematic securing of data and reduction of safety blind spots. Effective methods had been suggested to overcome the barriers that hindered the development and application of smart construction safety technology. This study facilitates in the technological improvements in this field.

CCTV 영상을 활용한 동적 객체의 위치 추적 및 시각화 방안 (Location Tracking and Visualization of Dynamic Objects using CCTV Images)

  • 박상진;조국;임준혁;김민찬
    • 지적과 국토정보
    • /
    • 제51권1호
    • /
    • pp.53-65
    • /
    • 2021
  • 국내·외적으로 수행되고 있는 다양한 C-ITS 관련 도로 인프라 구축 사업들은 다양한 센서 기술들을 융합적으로 활용하고 있으며, 도로 인프라의 효율성과 신뢰성을 높이기 위해 센서 관련 기술 향상에 많은 노력을 하고 있다. 최근에는 인공지능 기술의 발전으로 영상정보를 수집하는 CCTV의 역할은 더욱 중요해지고 있다. CCTV는 현재 도로 상태 및 상황, 보안 등의 이유로 많은 양이 구축되어 운영되고 있으나, 단순한 영상 모니터링에 주로 활용되고 있어 자율주행 측면에서 센서들에 비해 활용도가 부족한 실정이다. 본 연구에서는 기구축된 CCTV영상에서 이동체(차량·사람 등)들을 식별·추적하고, 이들의 정보를 다양한 환경에서 활용할 수 있도록 분석·제공하는 방안을 제안한다. 이를 위해 Yolov4와 Deep sort 알고리즘을 활용한 이동체 식별·추적과 Kafka 기반의 실시간 다중 사용자 지원 서버 구축, 영상과 공간 좌표계 간의 변환 행렬 정의, 그리고 정밀도로지도, 항공맵 등을 활용한 맵기반 이동체 시각화를 진행하였으며, 유용성을 확인하기 위한 위치 정합도 평가를 수행하였다. 제안된 방안을 통해 CCTV가 단순한 모니터링 역할을 넘어 도로 인프라 측면에서 도로 상황을 실시간으로 분석하여 관련 정보를 제공할 수 있는 중요한 센서로써의 역할을 할 수 있음을 확인하였다.

RFID와 SIP를 활용한 병원에서 개체의 위치확인시스템 설계 및 구현 (Design and Implementation of location identification system in hospital using RFID and SIP)

  • 박용민;김경목;박승균;오영환
    • 대한전자공학회논문지TC
    • /
    • 제45권1호
    • /
    • pp.1-7
    • /
    • 2008
  • 현재 국내 의료계는 의료시장개방과 영리법인화, 민간의료보험 도입 등 급격한 의료 환경의 변화를 앞두고 있다. 이에 따라 주요 대학병원을 중심으로 중장기적 비전수립을 통해 변화를 꾀하려는 움직임이 곳곳에서 감지된다. 이러한 병원의 현실과 환자들의 다양한 요구에 발맞추어 RFID와 USN 기술을 이용한 첨단화된 시스템을 업무에 도입하여 개선함으로써 병원서비스를 차별화하고자 한다. 그러나, 아직 유비쿼터스 기술을 접목한 병원정보시스템의 도입은 표준화 및 여러 문제로 인해 부분적으로만 적용하고 있는 실정이다. 특히 RFID 기술 적용에 있어서 의료 환경에 적합한 태그 설계의 부재와 RFID 시스템의 호환성 및 확장성의 문제가 현실적으로 요구되고 있다. 본 논문에서는 이러한 문제를 해결하기 위하여 병원환경을 위한 RFID Tag 설계, RFID와 SIP의 연동을 위한 RFID-SIP UA(User Agent) 설계, 개체의 위치 추적을 위한 위치 추적 프로그램을 구현하였다. 실험 결과 제안한 시스템은 EPCglobal 사에서 제안한 대표적인 EPCglobal network와 비교했을 때, 현재의 네트워크를 수정없이 그대로 사용하며, 분산된 구조를 가지고 있기 때문에 호환성 및 확장성등의 장점을 가진다. 이러한 결과를 토대로 제안한 논문을 차세대 RFID 애플리케이션 서비스를 위한 모델을 제시한다.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.