Abstract
There are a variety of dangerous situations that elementary school students encounter when they commute to their school. Given that smart phone is the one of devises utilized a lot by the elementary school students, it is possible to develop and utilize the safety apps of the smart phone for the elementary school students to protect them from the variety of the dangerous situations. For an example, when the elementary school students encounter dangerous situations in cloud computing environments, the urgent situations can be notified to their parents automatically and the smart phones of theirs can inter-perform with diverse kinds of deployed sensors and actuators. One of research introduces an app that utilizes behavior networks. By applying behavior network two times for recognizing dangerous situations, two different situations can be recognized and handled separately. However, given that the dangerous situations are more complicated, further research is required to improve the processes of the app. This paper proposes a multi-level behavior network-designed method to automatically determine dangerous situations. Behavior network is applicable to the circumstances by using measured values of smart phone sensors. To recognize dangerous situations by utilizing behavior networks, Bayesian probability is also utilized. By learning dangerous situations iteratively, multiple dangerous situations were recognized and handled accurately, which increases the safety of elementary school students.















Similar content being viewed by others
References
Son T, Kwak J, Gong S, Sung Y (2015) Risk decision method based on sensory values of smart devices. Lect Notes Electr Eng 345:277–282
Son T, Sung Y (May 28–30, 2015) Implementation of Smart Phone Sensory-Based Risk Recognition System of Elementary Schoolchildren, Korea Multimedia Society Spring Conference, vol 18(1), Andong, pp 596–599
Goodson JL (2005) The vertebrate social behavior network: evolutionary themes and variations. Horm Behav 48(1):11–22
O’Connell LA, Hofmann HA (2011) The vertebrate mesolimbic reward system and social behavior network: a comparative synthesis. J Comp Neurol 519(18):3599–4238
Sung Y, Cho K (2012) Development and evaluation of wireless 3D video conference system using decision tree and behavior network. EURASIP J Wirel Commun Netw 2012(1):1–14
Kertész C (2012) Dynamic behavior network. In: 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics. SAMI, Herl’any, pp 207–212
Kwak J, Sung Y (November 07–08, 2014) Bayesian Probability-Based Behavior Network Design for Recognizing Dangerous Situations of Schoolchildren, Korea Information Processing Society Fall Conference, vol 21(2), Busan, pp 865–867
Kwak J, Gong S, Sung Y (2015) Behavior network-based risk recognition method. Lect Notes Electr Eng 345:201–205
Kwak J, Sung Y (May 28–30, 2015) Multi-Behavior Network-based Risk Recognition Approach, Korea Multimedia Society Spring Conference, vol 18(1), Andong, p 1165
Jeon H-k, Park Y, Lee J (2007) Design of Infant Danger Notification System using Context-Information on the Home Network Environment, Korea Institute of Information Technology Summer Conference, Gumi, pp 324–329
Lee JH (2009) A design of mobile silver-care service based on GPS and SMS. J Korean Inst Commun Sci 34(12):355–362
Cha S-H, Kim D-Y, Choi J-H, Lee J-E, Kim K-H, Cho K-H (2008) Design and implementation of an OSGi-based old age patient care system in embedded programming on rfids and infrared sensors. J Korean Inst Commun Sci 33(11):1005–1012
Yoon S (2012) A study on the automatic detection method of urgent traffic situation and direction for headphone. Andong National University, Master thesis
Kwak N-J, Song T-S (2014) Object-action and risk-situation recognition using moment change and object size’s ratio. J Korea Multimed Soc 17(5):556–565
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, D.G. A multi-level behavior network-based dangerous situation recognition method in cloud computing environments. J Supercomput 73, 3291–3306 (2017). https://doi.org/10.1007/s11227-017-1982-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-017-1982-1