designandimplementationofintelligentmobileinformationsystemforcampussafetymanageme

更新时间:2023-06-30 19:55:49 阅读: 评论:0

Design and implementation of intelligent mobile information system
for campus safety management
Li-Shan Chen
Abstract----If information technology can be utilized for campus safety, it would be helpful for school staff to monitor all situations in schools. This study is bad on campus safety management and is aimed at establishing an intelligent mobile information system in colleges; this will facilitate the installation of video recorders in the rush areas (at the entrance and exit of the campus) and unarresting places on campus. This study adopts the Windows Media Player along the RTP/RTSP protocol in order to embed the mobile information system int o the urs’ machine s (personal digital assistants or smart phones). In this study, we randomly lect 40 school staff, and 100 students, for testing the intelligent system and software. Further, the obtained results are compared with tho from a conventional school safety system. Forty-two percent of urs are satisfied with the conventional safety system, and ninety-six percent of the urs are satisfied with the intelligent mobile system when using personal digital assistants. The software integrity satisfaction is %; usability satisfaction, 96%; correctness, 95%; and reliability, 95%.
Keywords: Campus Safety; Intelligent System; Mobile;
贪睡母女猫
RTP/RTSP
I. Introduction
Recently, the mobile telecommunication industry has experienced significant advances, and it will continue to evolve in the near future【1】. The success of wireless and mobile communications in the 21st century has resulted in a large variety of wireless technologies such as cond-, third-, and fourth-generation cellular, satellite, Wi-Fi, Bluetooth, and WiMAX (IEEE rvices. IEEE is designed to support high capacities, high data rates, and multimedia rvices. The aim of IEEE is to fill the gap between the high data rates of wireless local area networks (WLANs) and the high mobility of cellular wide area networks (WANs)【2】. Technological developments in content-bad analysis of digital video information are undergoing much progress, with ideas for fully automatic systems now being propod and demonstrated 【3】. In the near future, veral radio access technologies will coexist in Beyond 3G mobile networks (B3G) and they will be eventually transformed into one amless global communication infrastructure. Self-managing systems . tho that lf-configure, lf-protect, lf-heal and lf-optimize) are the solution to tackle the high complexity inherent to thepf是什么意思
networks 【1】. Digital reprentations are widely ud for audiovisual content, enabling the creation of large online repositories of video, allowing access such as video on demand 【4】. Digital artifacts created via transformational technologies often embody implicit knowledge that must be correctly interpreted to successfully act upon the artifacts【5】. With continued advances in communication network technology and nsing technology, there is astounding growth in the amount of data produced and made available through cyberspace【6】. An additional major benefit is if a partial prototype implementation can be automatically generated from a given software architecture design 【7】. At prent, for campus safety in schools, digital monitors and IP-Cams are connected to form an imaging system; thus, an image information system network is established. Such networks help school staff monitor the situations at schools. The staff can lect images that they want to view; simultaneously, they can view the general images of the campus, corner areas, entrance of the school and areas around the information system. In this study, we randomly lect 40 school staff, and 100 students, for testing the intelligent system and software. Further, the obtained results are compared with tho from a conventional school safety system.
II. Related study
A.For Mobile Communication
Wireless communication rearch is evolving toward integration, inter-working, and convergence of wireless systems, which will yield veral concepts of simultaneous u (Ferreira et al., 2006)【8】. Malek and Frank 【9】have focud on determining a near-optimal collision-free path becau of its importance in robot motion planning, intelligent transportation systems, and any autonomous mobile navigation system. Yang et al.【10】have prented a perspective on the future vision of mobile communications and rvices, which is referred to as mobile ubiquitous rvice environments, and Dixit【11】identified the key barriers to achieving true network convergence. The influence of the provision of curity is evaluated in the protocols and applications/scenarios where nsors can be ud【12】, and more than 80,000 scalar multiplications per cond are performed to enhance curity in wireless mobile applications 【13】. A distributed channel assignment protocol bad on a cross-layer approach has been propod, and it has been shown that the propod protocol can substantially increa throughput and reduce delay in wireless ad hoc networks【14】. Pavlou【15】documented a historic evolution, highlighted important design choices, and explained the hows and whys behind the various frameworks and technologies.
Sánchez et. al.【16】prented a model to design and implement mobile applications to support the displacement and dynamic decision making of urs with visual disabilities, and the problem of sche
duling packets for downlink transmissions in the time slots of a frame is addresd in such a way that the quality-of-rvice requirements are fulfilled 【17】. A spanning tree is bad on the autoconfiguration of mobile ad hoc networks and a novel approach for efficient distributed address autoconfiguration 【18】. Fingerprint technicians’ occupationally defined values and norms have played an important role in structuring their existing work practices, as well as the tension produced by organizationally mandated efforts to restructure the logic of their experti-bad hierarchies【19】. Pavlou et al.,【20】build upon the principal–agent perspective to propo a t of four uncertainty mitigating factors—trust, Web site informativeness, product diagnosticity, and social prence.
西安街舞培训班An interface between the applications and the underlying transport network has been defined that offers the dynamic and efficient management of network resources bad on a policy-bad resource control engine【21】. Gao and Zhang 【22】have propod an effective technique to determine the number and distribution of equilibria and a new supervid linear feature extraction technique for multiclass classification problems particularly suited to the nearest-neighbor classifier technique【23】. Two connectionist schemes, namely, (1) detection of bad/derogatory groups of features online and (2) the elimination of the effect of the bad features while performing function a
pproximations or classification tasks【24】. Payne【25】examines the Web rvice paradigm from an open multiagent system perspective and contrasts the formally grounded knowledge-centric view of agents with a pragmatic declarative bottom-up approach adopted by Web rvices. The architecture modeling system can identify different elements and styles in a variety of buildings【26】; location-bad spatial queries having certain unique characteristics can be revealed, which traditional spatial query processing systems employed in centralized databas do not address【27】. Medium access control protocols have quality-of-rvice support topology independent link activation transmission scheduling—for mobile code-division multiple-access ad hoc networks【28】.
Flesca et al.,【29】investigated the minimization problem for    a wide fragment of XPath (namely X P[✶]), where the u of the most common operators (child, descendant, wildcard, and branching) is allowed with some syntactic restrictions; a novel approach is developed for static index pruning that considers the locality of occurrences of words in the text【30】, and more nuanced understanding of consumer channel choices is developed【31】. The context-aware query processing system enhances the mantic content of Web queries using two complementary knowledge sources: lexicons and ontologies【32】.
B.For Monitoring System
Tan et al.,【35】investigated the performance of tho 3G networks in terms of their data throughput, latency, video and voice calls handling capacities, and their ability to provide rvice guarantees to different traffic class under saturated and lightly-loaded network conditions.
A software architecture design has many benefits
including aiding comprehension, supporting early analysis, and providing guidance for subquent development activities 【4】.
The monitoring system is digitized and the information transfer is systematized. The definition of a photograph in this information system and the convenience in its management are apparently different from tho of a conventional system; a video frame can be viewed via a network. The previous studies have focud on mechanical monitors and control of the bottoms; they didn’t add intelligent function s on the bottoms. The mobile information system has facilitated convenience in campus safety management. Nowadays, intelligent systems are extensively being applied for monitoring at homes and companies for safety management and burglary prevention; however, intelligent systems have not yet been widely applied for campus safety management.
洋服
III. Rearch method
The mobile information system is developed in the environment of: Microsoft Windows Server 2008, Internet Information Services (IIS , Microsoft Structured Query Language (MS SQL) Server 2005, and Visual Studio 2008 (VS 2008). The human-computer-interface software is developed in the environment of Microsoft Windows Embedded CE relea 2, MS SQL rver 2005, and edited using VS 2008. The programming languages are Extensible Markup Language (XML) and C#.
A.Several parts are stated as below in this study
Figure 1 shows the main frame of the general concept of this study.
Figure 1:Main frame of the general concept of this study This study is conducted on the basis of a distributed system. Thus, the display layer, image retrieved layer, agent layer and information could be placed at any point on the Internet. The advantage of using a frame in this study is its high availability; any layer, when shut down, can be restarted in another location. It is unlimited and the rver should be placed in local schools.
The practical frame diagram for a single school is shown in Figure 2.
Figure 2:Practical frame diagram for a single school The wireless IP-Cam is linked through a wireless access point ; the wired IP-Cam is connected to switch via an RJ-45 connector. The switch is linked to a media streaming rver on the Intranet of the campus for saving and retrieving images. The media streaming rver builds a broadcasting point through which images that are collected from the inner network are broadcast on the outer network for the urs to monitor.
The images that the urs want to monitor are automatically retrieved through agents and downloaded to the urs’ mobile tools after they login to their accounts. Moreover, the urs can monitor in-time images of any classroom or any corner of the campus through the agents.
best thing i never had>i am number 4
B.Establishment of the databa
This study adopts the relational databa management system to establish the databa. The Boyce-Codd Normal Form (BCNF) is ud for databa normalization. During the process of standardization, a larger amount of time is required to integrate the joins when checking the gment of relational joins. Therefore, a balanced point should be obtained between the flexibility and efficiency of the databa. As a result of the high-speed reaction in time, and for obtaining a balanced point between flexibility and efficiency,    a compromi task is required for obtaining the BCNF. Microsoft SQL Server 2005 is adopted for the platform in the databa management system.
The study adopts the ‘three-layer frame’, which is the
dome是什么意思basic frame of the N-Tier architecture. The three-layer frame is shown in Figure 3.
Figure 3:Three-layer frame
Each layer has its own responsibility, and they are stated as follows:
1)Databa layer: It stores the data. The basic information
of the urs and children are stored in this layer.
2)Agent layer: When the urs expect certain information,
the agent retrieves it and replies to the urs. The agent layer can be considered to be a middle layer between the Internet and databa rver. When the urs nd a request for monitoring the images of their children in class, the agents will begin to find the data demanded by the urs (for example, the location of the student in the class). Since the expected information is expresd in a worded pattern, it must be uploaded to the streaming rver and converted to string flow images. Then, the stream images are transferred t o the urs’ machines.
3)Guest layer: It means the end ur. Urs nd a
request through the Internet to the agent layer, and the agent layer is responsible for storing or retrieving the information from the databa.
C.Steam Images
Stream images play an important role in this study becau they are the means by which the urs receive image information of situations that they expect to monitor. As shown in Figure 4, the Microsoft Media Server (MMS) protocol is employed between the web rver and the media stream rver【36】. Figure 4:MMS protocol ud between the web rver and media stream rver
The process of linking is described by an example of a WMV file of 300 kbps in the linking of 500 Kbps. In this example, urs request a 300 kbps WMV file from the rver with a speed of 500 Kbps; then, the rver will nd the information for approximately the first 10 s in order to store in the buffer area. In this process, the linking speed is 500 Kbps; however, the remaining stream information utilizes the speed of 300 Kbps to transmit to the urs, as shown in Figure 5.
Figure 5:The linking speed is 500 Kbps; however, the remaining stream information utilizes the speed of 300 Kbps to transmit to the urs
The problems with IP-cams can be solved by establishing a streaming media rver. Hence, the problems related to simultaneous transfer of information and limited bandwidth can be solved; further, in order to achieve the monitoring demanded by the urs, the retrieved images can be transmitted in a planned and systematic manner.
When the urs login to the system, they will arch the images from the databa and the agents will capture the images to transfer them to the urs from the streaming rver, as shown in Figure 6.
look into
Figure 6:Urs login to the system
A portion of the databa rver codes programmed with the Virtual C# language are shown in Figure 7.
Figure 7:Portion of databa rver codes
D. Comparison of new system and old system
From March 15th  to March 19th , 2008, the former fifty persons who entered the campus in the morning were tested the new system and old system. They also tested the software satisfaction. In this study, there are 40 school staff, and 100 students taking part in testing the new system, old system, and software. They compared image transmitting velocity, clear,  personal rvice, and convenient usage between new system and old system .
IV. Result and Discussion
A. Result
The mobile information system for PDAs has been developed successfully, as shown in Figures 8–10.
Figure 8:Login frame
ek
Figure 9:Selection frame
Figure 10:Campus frame
This study provides a solution (including hardware solutions) to promote campus safety management.  The system developed will be more advantages for school staff and students.
foreverlove什么意思B. Disscussion
In this study, we randomly lect 40 school staff, and 100 students, for testing the intelligent system and software.  The urs satisfied with the conventional safety system when using their PDAs (student: 44/100; staff: 15/40); the urs satisfied with the intelligent mobile information system when using their PDAs (student: 95/100; staff: 39/40), as shown in Figure 11.

本文发布于:2023-06-30 19:55:49,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/90/162916.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:西安   贪睡   街舞   母女
相关文章
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图