INTELLIGENT MOBILE SAFETY SYSTEM TO EDUCATIONAL ORGANIZATION

Li-Shan Chen

2010

Abstract

This study aims to develop safety system, and let the system become intelligent. We adopt the swarm intelligence and active Ultra-High Frequency RFID for safety system, and develop friendly human-computer-interface software for users use the personal digital assistants. We program the system and software with Extensible Markup Language (XML) and C sharp language. If the users begin to search, the kernel safety system automatically communicates with other RFID readers by agents, and the agents can search the closer camera for users. This study’s result has successfully implemented to one educational organization, and it would be helpful for the paterfamiliases to hold all situations about their children at the educational organization. That will be great help in the grip of whole after-school remedial education, teaching and learning situation. We select 100 paterfamiliases to test this system and software. It is revealed that 93% of the paterfamilias are satisfied with the system (Strongly agree :25/100 ; Agree:68/100 ; Disagree:5/100 ; Strongly disagree:2/100). The software searching correctness is 95% (Strongly agree :30/100 ; Agree:65/100 ; Disagree:3/100 ; Strongly disagree:2/100).

References

  1. Abad, E., Palacio, F., Nuin, M., Zárate, A. G., Juarros, A., Gómez, J. M., & Marco, S. (2009). RFID smart tag for traceability and cold chain monitoring of foods: Demonstration in an intercontinental fresh fish logistic chain. Journal of Food Engineering, 93 (4), 394-399.
  2. Allahverdi, A., & Al-Anzi, F. S. (2008). The two-stage assembly flowshop scheduling problem with bicriteria of makespan and mean completion time. International Journal of Advanced Manufacturing Technology, 37 (1-2), 166-177.
  3. Angeles, R. (2009). Anticipated IT infrastructure and supply chain integration capabilities for RFID and their associated deployment outcomes. International Journal of Information Management, 29 (3), 219-231.
  4. Barco, R., Lázaro, P., Díez, L., & Wille, V. (2008). Continuous versus discrete model in autodiagnosis systems for wireless networks. IEEE Transactions on Mobile Computing, 7 (6), 673-681.
  5. Birattari, M., Pellegrini, P., & Dorigo, M. (2007). On the invariance of ant colony optimization. IEEE Transactions on Evolutionary Computation, 11 (6), 732-742.
  6. Broekmeulen, R. A. C. M & Donselaar, K. H. V. (2009). A heuristic to manage perishable inventory with batch ordering, positive lead-times, and time-varying demand. Computers & Operations Research, 36 (11) , 3013-3018.
  7. Chen, K., & Liu, L. (2006). iVIBRATE: Interactive visualization-based framework for clustering large datasets. ACM Transactions on Information Systems (TOIS), 24 (2), 245-294.
  8. Chen, L. S. (2008). Design and implementation of intelligent library system. Library Collections, Acquisitions, and Technical Services, 32 (3-4), 127-141.
  9. Chen, L. S. (2009). Design and implementation of intelligent mobile information system for campus safety management. International Journal of Organizational Innovation, 2, 320-340.
  10. Chen, L. S. (2010). Applying swarm intelligence to a library system. Library Collections, Acquisitions, and Technical Services, 34 (1), 1-10.
  11. Chen, L. S., & Chen, S. L. (2007). Collaborative Design and Manufacture on Intelligent System. Journal of the Chinese Society of Mechanical Engineers, 28(2), 233-242.
  12. Delgado, M., Ros, M., & Vila, M. A. (2009). Correct behavior identification system in a Tagged World. Expert Systems with Applications, 36 (6), 9899-9906.
  13. Fan, X., Wang, R., Sun, S., & Yen, J. (2006). Context-Centric Needs Anticipation Using Information Needs Graphs. Applied Intelligence, 24(1), 75-89.
  14. Felfernig, A., Friedrich, G., Isak, K., Shchekotykhin, K., Teppan, E., & Jannach, D, (2009), Automated debugging of recommender user interface descriptions. Applied Intelligence, 31(1), 1-14.
  15. Gao, B., & Zhang, W. (2008). Equilibria and their bifurcations in a recurrent neural network involving iterates of a transcendental function. IEEE Transactions on Neural Networks, 19 (5), 782-794.
  16. Hyowon, L., Alan, F. S., Noel, E. O'., & Barry, S. (2006). User evaluation of Físchlár-News: An automatic broadcast news delivery system. ACM Transactions on Information Systems (TOIS), 24 (2), 145-189.
  17. Jannach, D., Leopold, K., Timmerer, C., & Hellwagner, C. H. (2006). A knowledge-based framework for multimedia adaptation. Applied Intelligence, 24 (2), 109-125.
  18. Justin, Z., & Timothy, C. H. (2006). Detection of video sequences using compact signatures. ACM Transactions on Information Systems (TOIS), 24 (1), 1-50.
  19. Kaikhah, K., & Doddament, S. (2006). Discovering Trends in Large Datasets Using Neural Networks. Applied Intelligence, 24 (1), 51-60.
  20. Ku, W. S., Zimmermann, R., & Wang, H. (2008). Location-based spatial query processing with data sharing in wireless broadcast environments. IEEE Transactions on Mobile Computing, 7 (6), 778-791.
  21. Lee, C. K. M., & Chan, T. M. (2009). Development of RFID-based Reverse Logistics System. Expert Systems with Applications, 36 (5), 9299-9307.
  22. Lee, C. S., & Wang, M. H. (2009). Ontology-based computational intelligent multi-agent and its application to CMMI assessment. Applied Intelligence, 30( 3), 203-219.
  23. Leonardi, P. M., & Bailey, D. E. (2008). Transformational Technologies and The Creation of New Work Practices :Making Implicit Knowledge Explicit in Task-Based Offshoring. MIS Quarterly, 32 (2), 411-436.
  24. Li, L., Cai, Y., & Xu, X. (2007). Spanning-tree based autoconfiguration for mobile ad hoc networks. Wireless Personal Communications, 43 (4), 1465-1477.
  25. Malek, M. R., & Frank, A. U. (2006). A mobile computing approach for navigation purposes web and wireless geographical information systems. Lecture Notes in Computer Science 4295, 123-134.
  26. Masip, D., & Vitria, J. (2008). Shared feature extraction for nearest neighbor face recognition. IEEE Transactions on Neural Networks, 19 (4) , 586-595.
  27. Pavlou, P. A., Huigang, L., & Yajiong, X. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31 (1), 105-136.
  28. Payne, T. R. (2008). Web services from an agent perspective. IEEE Intelligent Systems, 23 (2), 12-14.
  29. Wang, H. Y., & Chen, S. M. (2008). Evaluating students' answerscripts using vague value. Applied Intelligence, 28 (2), 183-193.
  30. Storey, V. C., Jones, A. B., Sugumaran, V., & Purao. S. (2008). A methodology for context-aware query processing on the World Wide Web. Information Systems Research, 19 (1), 3-25.
  31. Su, Y. S., Su, S. L., & Li, J. S. (2008). Topology-independent link activation scheduling schemes for mobile CDMA ad hoc networks. IEEE Transactions on Mobile Computing, 7 (5), 599-616.
  32. Yap, G. E., Tan, A. H., & Pang, H. H. (2008). Explaining inferences in Bayesian networks. Applied Intelligence, 29(3), 263-278.
  33. Zhou, W. (2009). RFID and item-level information visibility. European Journal of Operational Research , 198 (1), 252-258
Download


Paper Citation


in Harvard Style

Chen L. (2010). INTELLIGENT MOBILE SAFETY SYSTEM TO EDUCATIONAL ORGANIZATION . In Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2010) ISBN 978-989-8425-17-1, pages 55-62. DOI: 10.5220/0002977900550062


in Bibtex Style

@conference{ice-b10,
author={Li-Shan Chen},
title={INTELLIGENT MOBILE SAFETY SYSTEM TO EDUCATIONAL ORGANIZATION},
booktitle={Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2010)},
year={2010},
pages={55-62},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002977900550062},
isbn={978-989-8425-17-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2010)
TI - INTELLIGENT MOBILE SAFETY SYSTEM TO EDUCATIONAL ORGANIZATION
SN - 978-989-8425-17-1
AU - Chen L.
PY - 2010
SP - 55
EP - 62
DO - 10.5220/0002977900550062