• Title/Summary/Keyword: wireless computing

Search Result 1,020, Processing Time 0.03 seconds

The study on the current status of the intelligent agent with "added characteristic" and its development scheme (캐릭터성을 추가한 지능형 에이전트의 국내 사례와 발전방안 연구)

  • Maeng, Jae-Hee;Park, Jin-Wan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.64-67
    • /
    • 2006
  • Computer performance and the development of computer appliances of today have adopted a new shape of concept, "ubiquitous computing." Thus, users can readily obtain access to abundant information as they can utilize the wireless network taking advantage of the ubiquitous concept, which allows usage inhibited by neither time nor location. In this process, the supply and feedback of information tends to be made real in the form of "interactive agent". This interactive agent with the application of artificial intelligence can enhance the reliability of information using friendly characters, and is used as a tool to grasp the intention! and behavior patterns of the users. This paper will take a look at the concept and the definition of the intelligent agent with "added characteristic", and furthermore investigate the potential and the scope of its development analyzing its features and comparing the examples of the domestic market that pursues to generate profits with it.

  • PDF

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Design and Implementation of a Mobile System for Exploiting the Internet Product Information Effectively (인터넷 상품정보의 효과적 제공을 위한 모바일 시스템의 설계 및 구현)

  • Ha Sangho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.493-498
    • /
    • 2005
  • With the advances of wireless technologies and mobile computing, m-commerce is being realized for several mobile devices such as PDAs and mobile phones. Currently, service contents in m-commerce are usually newly written to meet specific characteristics of the target mobile devices, thus requiring formidable efforts. Therefore, we should exploit the Internet product information currently being provided for e-commerce. However, bringing the Internet product to mobile devices is far from straightforward due to the many limitations of mobile devices such as little memory, small displays, low processing speeds, and so forth. In this paper, we first suggest a new model to effectively adapt the Internet product information for mobile phones. We then suggest a mobile system to implement the model. We then design and implement the system. Finally, we give experiments on the system.

A Data Mining Tool for Massive Trajectory Data (대규모 궤적 데이타를 위한 데이타 마이닝 툴)

  • Lee, Jae-Gil
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.145-153
    • /
    • 2009
  • Trajectory data are ubiquitous in the real world. Recent progress on satellite, sensor, RFID, video, and wireless technologies has made it possible to systematically track object movements and collect huge amounts of trajectory data. Accordingly, there is an ever-increasing interest in performing data analysis over trajectory data. In this paper, we develop a data mining tool for massive trajectory data. This mining tool supports three operations, clustering, classification, and outlier detection, which are the most widely used ones. Trajectory clustering discovers common movement patterns, trajectory classification predicts the class labels of moving objects based on their trajectories, and trajectory outlier detection finds trajectories that are grossly different from or inconsistent with the remaining set of trajectories. The primary advantage of the mining tool is to take advantage of the information of partial trajectories in the process of data mining. The effectiveness of the mining tool is shown using various real trajectory data sets. We believe that we have provided practical software for trajectory data mining which can be used in many real applications.

The Optimized Detection Range of RFID-based Positioning System using k-Nearest Neighbor Algorithm

  • Kim, Jung-Hwan;Heo, Joon;Han, Soo-Hee;Kim, Sang-Min
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.270-271
    • /
    • 2008
  • The positioning technology for a moving object is an important and essential component of ubiquitous communication computing environment and applications, for which Radio Frequency IDentification Identification(RFID) is has been considered as also a core technology for ubiquitous wireless communication. RFID-based positioning system calculates the position of moving object based on k-nearest neighbor(k-nn) algorithm using detected k-tags which have known coordinates and k can be determined according to the detection range of RFID system. In this paper, RFID-based positioning system determines the position of moving object not using weight factor which depends on received signal strength but assuming that tags within the detection range always operate and have same weight value. Because the latter system is much more economical than the former one. The geometries of tags were determined with considerations in huge buildings like office buildings, shopping malls and warehouses, so they were determined as the line in 1-Dimensional space, the square in 2-Dimensional space and the cubic in 3-Dimensional space. In 1-Dimensional space, the optimal detection range is determined as 125% of the tag spacing distance through the analytical and numerical approach. Here, the analytical approach means a mathematical proof and the numerical approach means a simulation using matlab. But the analytical approach is very difficult in 2- and 3-Dimensional space, so through the numerical approach, the optimal detection range is determined as 134% of the tag spacing distance in 2-Dimensional space and 143% of the tag spacing distance in 3-Dimensional space. This result can be used as a fundamental study for designing RFID-based positioning system.

  • PDF

Intelligent Safe Network Technology for the Smart Working Environments based on Cloud (클라우드 기반 스마트 사무환경 구축을 위한 지능형 세이프 네트워크 기술)

  • Kim, Seok-Hoon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.345-350
    • /
    • 2014
  • According to the necessity of smart working with various mobile devices, and the increasing services based on the converged infrastructures such as Cloud, Wearable Computing, Next Generation Wired/Wireless Mobile Networks, the network reliability has been one of the most important things. However, the research related to the network reliability is still insufficient. To solve these problems, we propose the ISNTC (Intelligent Safe Network Technology based on Cloud), which uses the safe network technique based on SDN, to be adopted to the smart working environments. The proposed ISNTC guarantees secure data forwarding through the synchronized transmission path and timing. We have verified the throughput which outperformed the existing techniques through the computer simulations using OPnet.

Mapping algorithm for Error Compensation of Indoor Localization System (실내 측위 시스템의 오차 보정을 위한 매핑 알고리즘)

  • Kim, Tae-Kyum;Cho, We-Duke
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.4
    • /
    • pp.109-117
    • /
    • 2010
  • With the advent of new technologies such as HSDPA, WiBro(Wireless Broadband) and personal devices, we can access various contents and services anytime and anywhere. A location based service(LBS) is essential for providing personalized services with individual location information in ubiquitous computing environment. In this paper, we propose mapping algorithm for error compensation of indoor localization system. Also we explain filter and indoor localization system. we have developed mapping algorithms composed of a map recognition method and a position compensation method. The map recognition method achieves physical space recognition and map element relation extraction. We improved the accuracy of position searching. In addition, we reduced position errors using a dynamic scale factor.

3-D Hetero-Integration Technologies for Multifunctional Convergence Systems

  • Lee, Kang-Wook
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.22 no.2
    • /
    • pp.11-19
    • /
    • 2015
  • Since CMOS device scaling has stalled, three-dimensional (3-D) integration allows extending Moore's law to ever high density, higher functionality, higher performance, and more diversed materials and devices to be integrated with lower cost. 3-D integration has many benefits such as increased multi-functionality, increased performance, increased data bandwidth, reduced power, small form factor, reduced packaging volume, because it vertically stacks multiple materials, technologies, and functional components such as processor, memory, sensors, logic, analog, and power ICs into one stacked chip. Anticipated applications start with memory, handheld devices, and high-performance computers and especially extend to multifunctional convengence systems such as cloud networking for internet of things, exascale computing for big data server, electrical vehicle system for future automotive, radioactivity safety system, energy harvesting system and, wireless implantable medical system by flexible heterogeneous integrations involving CMOS, MEMS, sensors and photonic circuits. However, heterogeneous integration of different functional devices has many technical challenges owing to various types of size, thickness, and substrate of different functional devices, because they were fabricated by different technologies. This paper describes new 3-D heterogeneous integration technologies of chip self-assembling stacking and 3-D heterogeneous opto-electronics integration, backside TSV fabrication developed by Tohoku University for multifunctional convergence systems. The paper introduce a high speed sensing, highly parallel processing image sensor system comprising a 3-D stacked image sensor with extremely fast signal sensing and processing speed and a 3-D stacked microprocessor with a self-test and self-repair function for autonomous driving assist fabricated by 3-D heterogeneous integration technologies.

A Big Data Application for Anomaly Detection in VANETs (VANETs에서 비정상 행위 탐지를 위한 빅 데이터 응용)

  • Kim, Sik;Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.175-181
    • /
    • 2014
  • With rapid growth of the wireless mobile computing network technologies, various mobile ad hoc network applications converged with other related technologies are rapidly disseminated nowadays. Vehicular Ad Hoc Networks are self-organizing mobile ad hoc networks that typically have moving vehicle nodes with high speeds and maintaining its topology very short with unstable communication links. Therefore, VANETs are very vulnerable for the malicious noise of sensors and anomalies of the nodes in the network system. In this paper, we propose an anomaly detection method by using big data techniques that efficiently identify malicious behaviors or noises of sensors and anomalies of vehicle node activities in these VANETs, and the performance of the proposed scheme is evaluated by a simulation study in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

The Design and Implementation of the Data Link System based on the Off-the-shelf Ultra Mobile Personal Computer for Network Centric Warfare(NCW) (네트워크중심전(NCW)을 위한 UMPC 기반 데이터 링크 시스템 설계 및 구축)

  • Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.175-181
    • /
    • 2009
  • All of the military aircrafts in Korea Air Force are administered and operated together in the same system regardless of whether they are equipped with the data communication capability or not. The absence of the data communication capability in some of the aircrafts might increase whole kill chain hour at the point of the Network Centric Warfare achievement. Network synergy effects cannot also be desired if the section which is not connected to the network influences to the whole tactical network. Equipping aircrafts with the data communication capability could be done by upgrading the aircrafts, but resulting in high costs and long updating time. This paper is a research about the design and implementation of the UMPC based Data Link System to aircrafts that do not have the data communication capability. The proposed system grafts the UHF-based wireless modem technology and the aircraft flight mission support software onto the off-the-shelf UMPC and GPS system. The employed UHF radio equipment allows communicating tactic data with another aircrafts on the air, the ground control point, and even the Tactical Air Control Party(TACP) control vehicle that achieve missions with aircrafts. It thereby increases such capabilities as navigation aid, situation awareness, quick target identification and attack. We also applied Closed Air Support(CAS) scenarios, which is very close to the real environment, to the experiments of the proposed system. The experimental results show that the proposed system could support the data communication capability effectively and the flight mission at low costs of money and time.