A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards



Similar documents
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards

Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator

Crime Hotspots Analysis in South Korea: A User-Oriented Approach

Design of Remote data acquisition system based on Internet of Things

CARDA: Content Management Systems for Augmented Reality with Dynamic Annotation

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Developing Safety Management Systems for Track Workers Using Smart Phone GPS

The Development of an Intellectual Tracking App System based on IoT and RTLS

A Study on Integrated Operation of Monitoring Systems using a Water Management Scenario

Design and Implementation of Automatic Attendance Check System Using BLE Beacon

Research and Performance Analysis of HTML5 WebSocket for a Real-time Multimedia Data Communication Environment

Development of a Service Robot System for a Remote Child Monitoring Platform

Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service

Security Threats on National Defense ICT based on IoT

A Digital Door Lock System for the Internet of Things with Improved Security and Usability

A Resilient Device Monitoring System in Collaboration Environments

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Implementation of Augmented Reality System for Smartphone Advertisements

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

Cloud Computing based Livestock Monitoring and Disease Forecasting System

Customized Efficient Collection of Big Data for Advertising Services

Implementation of the E-Catalog Mobile E-commerce Platform using 3D GIS Information

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

A Design of Mobile Convergence Architecture for U-healthcare

Virtualization of Desktop for Improvement of Maintenance Cost Saving

A Study on Design of Health Device for U-Health System

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

Big Data Collection Study for Providing Efficient Information

Flexible Architecture for Internet of Things Utilizing an Local Manager

In the pursuit of becoming smart

Personal Health Care Management System Developed under ISO/IEEE with Bluetooth HDP

Basler. Line Scan Cameras

Intelligent Home Automation and Security System

RealTime Implementation of RTOS based Vehicle Tracking System

A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073

Development of IaaS-based Cloud Co-location and Management System using Open Source Cloud Stack

Effective Use of Android Sensors Based on Visualization of Sensor Information

Development of a Co-Creation Environment for an Open IoT Platform

Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements

Wearable Multiple Bio-sensing Process Architecture in Human Healthcare Environments

Data Logging and Realtime Visualization

Design of Wireless Home automation and security system using PIC Microcontroller

The Application Method of CRM as Big Data: Focused on the Car Maintenance Industry

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology

How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016

Function and Structure Design for Regional Logistics Information Platform

RUBA: Real-time Unstructured Big Data Analysis Framework

Fruit Quality Monitoring System Using the Smart RFID Tag

Mobile Hybrid Cloud Computing Issues and Solutions

Vehicle Tracking System using GPRS

Structure Based Enterprise Mobility for Mobile Device Applications for AHMS

Comparative Analysis of Several Real-Time Systems for Tracking People and/or Moving Objects using GPS

The Digital Signage System Supporting Multi-Resources Schedule on an Elevator

A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan

International Journal of Advanced Engineering Research and Science (IJAERS) Vol-2, Issue-11, Nov- 2015] ISSN:

A Study on UNIX Server Consolidation by Virtualization

Large Scale Spatial Data Management on Mobile Phone data set Using Exploratory Data Analysis

A study on Standardization of Integrated database for Intelligent water information management

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods

A Study on Cooperative System between Devices to Construct Internet of Things

Study of SAP ERP Connection System Driven in Smartphone

Enterprise Resource Planning System Deployment on Mobile Cloud Computing

I2C PRESSURE MONITORING THROUGH USB PROTOCOL.

ni.com Remote Connectivity with LabVIEW

Design of an Easy-to-Use Bluetooth Library for. Wireless Sensor Network on Android

VTOL UAV. Design of the On-Board Flight Control Electronics of an Unmanned Aerial Vehicle. Árvai László, ZMNE. Tavaszi Szél 2012 ÁRVAI LÁSZLÓ, ZMNE

Implementation of IR-UWB MAC Development Tools Based on IEEE a

Development of XML-based Standardized Software Database Specifications and Operating Schema

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology

Device-based Secure Data Management Scheme in a Smart Home

Smart Queue Management System Using GSM Technology

Example of Standard API

Supporting Collaborative Video Editing Over Cloud Storage

WIRELESS BLACK BOX USING MEMS ACCELEROMETER AND GPS TRACKING FOR ACCIDENTAL MONITORING OF VEHICLES

Context-aware Library Management System using Augmented Reality

SMART COLLEGE BUS TRACKING MANAGEMENT SYSTEM AND ITS APPLICATION

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

Development of Performance Testing Tool for Railway Signaling System Software

Application of Android Mobile Platform in Remote Medical Monitoring System

An ECG Monitoring and Alarming System Based On Android Smart Phone

WISE-4000 Series. WISE IoT Wireless I/O Modules

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens BlackVue Cloud BlackVue Wi-Fi Internal Memory...

Automated Real Time In-Store Retail Marketing Using Beacon

An Intelligent Parking Guidance and Information System by using image processing technique

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Messaging and Voice Conferencing through Wi-Fi Network

UPS battery remote monitoring system in cloud computing

Concept Design of Testbed based on Cloud Computing for Security Research

SCADA and Monitoring for Solar Energy Plant

A Study of Key management Protocol for Secure Communication in Personal Cloud Environment

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

Transcription:

, pp.166-171 http://dx.doi.org/10.14257/astl.205.98.42 A Noble Integrated Management System based on Mobile and Cloud service for preventing various hazards Yeo ChangSub 1, Ryu HyunKi 1 and Lee HaengSuk 1, 1 The GyeongBuk Research Institute of Vehicle Embedded Technology, GyeongBuk, Korea {ycs6841, hkryu, hslee}@givet.re.kr Abstract. In this paper, to take advantage of personalized black box service, we did design and implement a combination service using a user terminal and smart phone application, cloud server. This proposed system is to collect and analyze the individual's status information, it is possible to recognize a dangerous situation for users to inform the guardian or decided particular government department. To recognize dangerous situations, we are using various electronic sensors like magnetic gyro, GPS, short circuit sensor. Also, to predict future risk situations, we use a face detection method that based on digital image processing. So, it can be guaranteed to be secure before the crime incident. Keywords: Dangerous situation, Personalized black box, Mobile, Cloud server. 1 Introduction With the development of digital technology, the desire of users to record their lives has recently increased. Life logging devices and related technologies are developing as a result. Along with such trend, studies on services to improve safety and life quality in addition to simple logging are actively underway [1][2]. Among them, personalized black box life logging service can be applied in various fields that require personalized services such as crime prevention and ubiquitous computing environment. It can also be used for management of seniors demanding special care such as dementia patients and children, learning assistance in the field of education, and analysis of diseases using personal bio-information log. Related MyLifeBits [3] project of Microsoft is to construct a system that digitalizes and saves all of the information related to life of individuals, allowing users to easily search and browse information on the system. The main purpose of this project is to record information so it can be accessed when people want, which helps replace human memory. Another example of studies on life log is Stuff I`ve Seen (SIS) [4]. This system was developed for the goal of recording and reusing personal information. It records and doing index information about actions that occurs in desktop applications. It focuses on indexing and inquiry of saved information. Systems that recognize situations are being studied with a technology that determines the environment based on given context information, as well as a technology that transfers data using mobile devices at any place and time. Multi-modal interface can be regarded as a representative technology ISSN: 2287-1233 ASTL Copyright 2015 SERSC

[5]. In this paper, a system was designed and implemented so that daily activities of individuals can be recorded and traced using an exclusive device, recognizing information about what was said and done by the user, when and where to determine dangerous situations and informing such situations to a guardian or designated institution for crime prevention, accident monitoring and protection of the socially disadvantaged. For this purpose, a device based on 4G network (LTE) is manufactured and images obtained using the device are transmitted to a cloud server for analysis. Analyzed images are informed to a guardian or designated institution to avoid dangerous situations. Composition of this paper is as follows. Chapter 2 explains the mobile system proposed in this study to recognize dangerous situations based on cloud server. Chapter 3 explains details on the development of the proposed system, and Chapter 4 is a conclusion. 2 Design of Mobile System based on Cloud Server that Recognizes Dangerous Situations This paper designed a structure in which camera attached to the user device is used to transmit image and voice data to the cloud server on a real-time basis, and dangerous areas and persons detected are informed to a guardian or designated institution. Fig. 1 shows the mobile system architecture based on cloud server that can recognize dangerous situations proposed in this paper. Fig. 1. Mobile system architecture based on cloud server that can detect dangerous situations Image and data are generated on the user convenience device and meta information including temporal and spatial information (GPS) of the image is transmitted to the cloud server, and the cloud server stores the collected image / voice data and position values in the optimal format. In addition, stored data are analyzed to detect dangerous areas and persons based on position information and inform the situation to a guardian or designated institution. Copyright 2015 SERSC 167

2.1 User Convenience Terminal Device Module The device module includes a communication function for real-time transmission of data obtained by different sensors to the cloud server. The system power circuit was designed with consideration on stable output voltage, and the structure for measurement and dissipation of heat was enhanced. The memory interface circuit implemented an SDRAM interface for program data processing, and the camera interface circuit was designed to remove image signal noise. The software of the device used RTOS porting by modifying memory, IO, communication device and clock frequency according to hardware. Device driver preparation, analysis and control of communication protocol (Wi-Fi, LTE Modem), sensor and power controller, file system porting, TCP/IP stack porting and device API configuration were done. The main task was prepared by creating image and voice processing task frame. Fig. 2 shows hardware configuration of the device. Fig. 2. H/W configuration of the device 2.2 Smart phone application Important functions of the app include device setting, notice of dangerous situations, emergency call, situation monitoring, reception of position information, setting of dangerous areas, registration/authentication processing, and guardian registration. Fig. 3 shows software architecture of the smart phone app and application design configuration. Fig. 3. Software architecture of smart phone app and design configuration 168 Copyright 2015 SERSC

This round of checking takes place about two weeks after the files have been sent to the Editorial by the Contact Volume Editor, i.e., roughly seven weeks before the start of the conference for conference proceedings, or seven weeks before the volume leaves the printer s, for post-proceedings. If SPS does not receive a reply from a particular contact author, within the timeframe given, then it is presumed that the author has found no errors in the paper. The tight publication schedule of LNCS does not allow SPS to send reminders or search for alternative email addresses on the Internet. 2.3 Detection of Dangerous Persons using Face Recognition The objective of this system is to register the DB on dangerous persons provided by the government as a library on the cloud server and to use face recognition technique for detection of risk factors and prevention of crimes. Also, block matching algorithm is used to correct images, and image stabilization technique based on bit plane matching shaking can be used to correct images that are shaken during daily activities. The Ada-boost algorithm was used as an algorithm for face classification. After sequentially generating classifiers, analysis data used observation values extracted from the performance of the previous classifier. Fig. 4 shows the test results for the face recognition algorithm created based on the methods presented above. Fig. 4. Test results for the face recognition algorithm 3 Implement Result Data collected by camera on the device are transmitted to the cloud server through wireless network on a real-time basis. Segments of image / voice and position values of the user are processed by restful open API call for optimal storage and management in the cloud server. The cloud server provides an external open API interface to analyze data and operate service module. The cloud server manages image / voice information of the user for different situations as XML. When image / voice segments of the user are registered, the server receives the event by callback through the push manager and automatically links the Copyright 2015 SERSC 169

guardian to the corresponding image. Fig. 10 shows the inter-device scenario between the device and cloud server. Connection request on the device can only be made on Android app, and registration and setting of the device are done after connection. Completion of device registration is informed when unique device value is returned. Once device registration is complete, sendeventfile is used to transmit a danger detection event with an image to the server and sendevent is used to transmit a danger detection event without an image to the server. In addition, the device regularly sends image files to the server for face detection, as well as position information whenever position of the user is changed. Fig. 5 shows the screen in guardian mode and ward mode has a function that informs the user of danger through push message when the user enters a dangerous area. Fig. 5. APP screen of guardian and ward mode 4 Conclusion This system proposed in our paper transmits data from a personal device to a cloud server through wireless network on a real-time basis. The server analyzes and processes data to detect dangerous situations or persons and inform them to a guardian or designated institution. Primarily, the proposed system can prevent the user from exposure to dangerous areas and situations, and inform exposure to dangerous areas and situations to a guardian and designated institution for safety. The proposed system can additionally provide a monitoring function in various fields of application such as crime prevention, accident monitoring and protection of the socially disadvantaged. Acknowledgments. This research was financially supported by the Ministry of Trade, Industry and Energy (MOTIE) and Korea Institute for Advancement of Technology (KIAT) through the Infrastructure Project for Industrial Technology Development (No. N0001156). 170 Copyright 2015 SERSC

References 1. Sooyoun Park and SungIn Kim, Usability Evaluation of Lifelogging Application on Mobile - Focused on Dayone Application and Momento Application, Korea Digital Design Council journal, vol.14, No.1, pp. 117 127 (Jan 2014) 2. Gong KiHyun, et, al., A Lifelog System based on Context information, Journal of Computing Science and Engineering, Vol.36, No.1. 2009 3. Jim Gemmel, Gordon Bell, and Roger Lueder, MyLifeBits: A personal Database for Everything, Communications of the ACM, Vol. 49, No. 1, January 2006 4. Susan Dumais, et, al., Stuff I`ve Seen: A system for Personal Information Retrieval and Re- Use, SIGIR, 2003 5. Bok-Man Jang, et, al., U-healthcare Context-Awareness Security Framework Using Multimodal Interaction Agent, Journal of Security Engineering, Vol. 6, No. 5,pp.337-349, Oct 2009 Copyright 2015 SERSC 171