IPSI –Information Providing System for Individual Every individual can get information they want from anywhere, at anytime 20010221 Chulhyun Park 20010015.

Slides:



Advertisements
Similar presentations
Packets with Provenance Anirudh, Mukarram, Nick, Kaushik.
Advertisements

All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
OTP – SMS Two-Factor Authentication. TABLE OF CONTENTS Introduction3 OTP – SMS Two-Factor Authentication5 Technical Overview9 Features10 Benefits11 About.
Router Implementation Project-2
Intelligent RFID Solutions Active-RFID Platform For Security And Monitoring Solutions.
Access Control Enforcement Delegation for Information-Centric Networking Architectures N. Fotiou, G.F. Marias, G.C Polyzos.
Security Issues and Challenges in Cloud Computing
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Fall 2009ACS-3913 Ron McFadyen1 Use Cases Used to capture functional requirements – there are other requirements categories such as usability, reliability,
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
SaaS Software Container By Brian Moore Paul Kopacz.
INFO425: Systems Design INFORMATION X Finalizing Scope (functions/level of automation)  Finalizing scope in terms of functions and level of.
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Raffaele Di Fazio Connecting to the Clouds Cloud Brokers and OCCI.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
Wireless Internet Access Status of WiFi Programs in the City of Charlottesville May 3, 2012.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Windows Azure: Microsoft’s Cloud Platform By Shahed Chowdhuri.
2 Systems Architecture, Fifth Edition Chapter Goals Describe the activities of information systems professionals Describe the technical knowledge of computer.
Case Study ProsperaSoft’s global sourcing model gives the maximum benefit to customers in terms of cost savings, improved quality, access to highly talented.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Computer Emergency Notification System (CENS)
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
 Background & Overview  Business Model & Value Proposition  Consumer & Purchase Analysis  The E-Commerce Value Chain  Technical & Design Aspects.
MSF Design Example Conceptual Design Logical Design Physical Design.
USER IDENTIFICATION SYSTEM.
Microsoft Virtual Academy. STANDARDIZATION SELF SERVICEAUTOMATION Give Customers of IT services the ability to identify, access and request services.
L. A. S. E. R Local Authority Security Enterprise Reporting System Architecture.
Microsoft Azure Active Directory. AD Microsoft Azure Active Directory.
PRESENTATION DAY Group ID: gp09-cmg Speaker: Matthew Albers RFID APPLICATION DEVELOPMENT SUITE.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Server-Side Solutions Steve Perry
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
#SPSMX Hybrid Environments SharePoint On-premises & SharePoint Online Luis Du Solier SharePoint Premier Field Engineer Microsoft.
Network Requirements Analysis CPIT 375 Data Network Designing and Evaluation.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Vending machine monitoring system Industry&Business &Government IT transformation.
MarketEye™ Interactivity and Local Based Services via Text Messages (SMS) A Business Opportunity for Service Provider.
Copyright © 2014 INTEC Inc. All rights reserved. Introducing JPCERT/CC’s activity for securing IPv6 gears draft-jpcert- ipv6vullnerability-check-01 INTEC,
RETS Working Group August 5, 2004Slide 1 RETS 2.0 – Bridging the Gap Sergio Del Rio Templates 4 Business Inc.
April, 2016 How to Choose Collection Options for Smart Net Total Care.
Unit 3 Virtualization.
SmartAX MA5600 VLAN New Service
Azure Machine Learning
Munix Fitness Centers Customer Profiling, Attendance Management, SMS Alerts, Workout Schedule, Diet Management, and much more …. Internet Gateway & Business.
Richard Houser CTO verascape, inc.
PARKING AUTOMATION SYSTEM
Ministry of Health Maputo Mozambique
Intelligent Agent Solution
The status and future of based WLANs
Acutelearn Azure Administration Training in Hyderabad Classroom Training Instructor led trainings at Acutelearn premises Corporate Training Custom tailored.
Be Better: Achieve Customer Service Excellence and Create a Lean RMA and Returns Process with Renewity RMA and the Power of Microsoft Azure MICROSOFT AZURE.
Hybrid Search Phased Approach.
Azure Availability, Reliability, and Performance
Mobile Commerce and Ubiquitous Computing
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Technical Capabilities
Application Performance & Availability with vCloud Hybrid Service and KEMP Technologies New York: • Limerick: • Hannover:
Microsoft Virtual Academy
Internet Engineering Course
SUSE CaaS and Dell EMC.
Company Overview MegaPath is a leading provider of managed IP communications services in North America Business Founded in 1996 HQ in Pleasanton, CA 1,000+
Preparing for the Windows 8.1 MCSA
OCI – VPN Connect Internet Customer Premises
OU BATTLECARD: Oracle WebCenter Training
Microsoft Virtual Academy
Presentation transcript:

IPSI –Information Providing System for Individual Every individual can get information they want from anywhere, at anytime Chulhyun Park Hyun sun Ko

Contents  System Before & Now  Problems / Solutions  Detail  Scenario  Future Work

System change Generalize Already implemented!

Problems / Solutions  Spam information How can we handle spam information?  Classify all information into several classes  Authentication Some information should be secured  Leave it to application designers  Network overlapping RFID and overlapping problem  Cost (Infrastructure / Information) Who will pay all the costs?  Vendors who wants to inform  Customers who wants to be informed

Detail – Flow chart RFID tag CPA: Customer Premises Equipment Access Point Database (or Network)

Detail – RFID packet format  ID : Identification # of data object  Data name : Name of data object  Class : Classification # of data object  Data size : Size of full information  Channel : Used for overlapping problem IDData NameClassData SizeChannel(Opt.)

Detail – CPE App. & VM  Should be able to show information list from different RFIDs  Should be able to send request to access point for more information about selected data  Should support virtual machine that can execute program offered by service providers  More details left for the later part of presentation

Detail – Data format  Should contain Identification number Name Full information about service, object, etc.  Not to be restricted

Scenario  Street  Museum  Shopping center  Theater  Advertisement

Future Work  Technical Problem Overlapping of access point RFID range variation  Economical evaluation of system Is the system worth paying to  service providers for deploying infrastructure and producing information?  customers for getting information from the system?  Interactive System Abuse of system (Ex : 알바생, 악플러 )