Designing a Context-Aware System to Detect Dangerous Situations in School Routes for Kids Outdoor Safety Care

Ubiquitous computing is targeted at services and applications of computer and communication technologies in the real world. This research, as a part of UbicKids Project, is focused on designing a context-aware system that dynamically detects the possible dangerous situations in the routes where kids go to and return from schools, and provides prompt advices to kids who may encounter some dangerous situations. Based on analyses of typical dangerous situations in school routes, the paper then shows the system architecture and discusses about danger-related context information processing including context description, representation and presentation. Security and privacy issues and possible solutions are also explained. A preliminary system prototype has been implemented and some GUIs are explained. Related work is discussed with comparisons to other research work.

[1]  Christian Becker,et al.  Location Models from the Perspective of Context-Aware Applications and Mobile Ad Hoc Networks , 2002, Personal and Ubiquitous Computing.

[2]  Gregory D. Abowd,et al.  Ubiquitous Computing: Research Themes and Open Issues from an Applications Perspective , 1996 .

[3]  Paul Müller,et al.  Tackling Security and Privacy Issues in Radio Frequency Identification Devices , 2004, Pervasive.

[4]  Aviel D. Rubin Independent One-Time Passwords , 1996, Comput. Syst..

[5]  Thomas Erickson,et al.  Some problems with the notion of context-aware computing , 2002, CACM.

[6]  Jianhua Ma,et al.  Designing a space-oriented system for ubiquitous outdoor kid's safety care , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[7]  Vinny Cahill,et al.  Route profiling: putting context to work , 2004, SAC '04.

[8]  Chris J. Mitchell,et al.  Comments on the S/KEY user authentication scheme , 1996, OPSR.

[9]  Malcolm P. Atkinson,et al.  Issues Raised by Three Years of Developing PJama: An Orthogonally Persistent Platform for Java , 1999, ICDT.

[10]  Wenfei Fan,et al.  Keys with Upward Wildcards for XML , 2001, DEXA.

[11]  Uwe Hansmann,et al.  Pervasive Computing , 2003 .

[12]  Hector Garcia-Molina,et al.  Publish/Subscribe in a Mobile Environment , 2004, Wirel. Networks.

[13]  Anupam Joshi,et al.  Profile Driven Data Management for Pervasive Environments , 2002, DEXA.

[14]  Jianhua Ma,et al.  Towards a smart world and ubiquitous intelligence: A walkthrough from smart things to smart hyperspaces and UbicKids , 2005, Int. J. Pervasive Comput. Commun..

[15]  Thierry Van de Merckt Decision Trees in Numerical Attribute Spaces , 1993, IJCAI.

[16]  Nandit Soparkar,et al.  Data organization and access for efficient data mining , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).

[17]  Vipul Kashyap,et al.  Semantic and schematic similarities between database objects: a context-based approach , 1996, The VLDB Journal.

[18]  David F. Redmiles,et al.  The design of a configurable, extensible and dynamic notification service , 2003, DEBS '03.

[19]  Catriel Beeri,et al.  Schemas for Integration and Translation of Structured and Semi-structured Data , 1999, ICDT.

[20]  Hector Garcia-Molina,et al.  Publish/Subscribe in a Mobile Environment , 2001, MobiDe '01.