Emergency Response and Post-Disaster Recovery Using Smartphone-Based Applications

Author(s):  
Shahriar Kaisar

The number of natural disasters, such as tsunamis, earthquakes, flooding, cyclone, and bushfires, is rapidly increasing globally, and they are claiming thousands of lives while destroying numerous properties. One of the major concerns of these natural disasters is the destruction of communication links, such as powerline and Internet connections, which make it difficult to enable communication among the affected people and the rescue teams. However, the evolution of smart devices equipped with multiple short-range communication technologies, such as Bluetooth and Wi-Fi provides an opportunity to form an ad-hoc network with co-located smart mobile device users and communicate their positions and other relevant information to the rescue workers. This chapter provides a detailed description of recent advancement in this area and highlights important aspects that are needed to be considered for practical implementation.

2021 ◽  
Vol 10 (2) ◽  
pp. 91
Author(s):  
Triantafyllia-Maria Perivolioti ◽  
Antonios Mouratidis ◽  
Dimitrios Terzopoulos ◽  
Panagiotis Kalaitzis ◽  
Dimitrios Ampatzidis ◽  
...  

Covering an area of approximately 97 km2 and with a maximum depth of 58 m, Lake Trichonis is the largest and one of the deepest natural lakes in Greece. As such, it constitutes an important ecosystem and freshwater reserve at the regional scale, whose qualitative and quantitative properties ought to be monitored. Depth is a crucial parameter, as it is involved in both qualitative and quantitative monitoring aspects. Thus, the availability of a bathymetric model and a reliable DTM (Digital Terrain Model) of such an inland water body is imperative for almost any systematic observation scenario or ad hoc measurement endeavor. In this context, the purpose of this study is to produce a DTM from the only official cartographic source of relevant information available (dating back approximately 70 years) and evaluate its performance against new, independent, high-accuracy hydroacoustic recordings. The validation procedure involves the use of echosoundings coupled with GPS, and is followed by the production of a bathymetric model for the assessment of the discrepancies between the DTM and the measurements, along with the relevant morphometric analysis. Both the production and validation of the DTM are conducted in a GIS environment. The results indicate substantial discrepancies between the old DTM and contemporary acoustic data. A significant overall deviation of 3.39 ± 5.26 m in absolute bottom elevation differences and 0.00 ± 7.26 m in relative difference residuals (0.00 ± 2.11 m after 2nd polynomial model corrector surface fit) of the 2019 bathymetric dataset with respect to the ~1950 lake DTM and overall morphometry appear to be associated with a combination of tectonics, subsidence and karstic phenomena in the area. These observations could prove useful for the tectonics, geodynamics and seismicity with respect to the broader Corinth Rift region, as well as for environmental management and technical interventions in and around the lake. This dictates the necessity for new, extensive bathymetric measurements in order to produce an updated DTM of Lake Trichonis, reflecting current conditions and tailored to contemporary accuracy standards and state-of-the-art research in various disciplines in and around the lake.


2021 ◽  
Vol 42 (02) ◽  
pp. 158-164
Author(s):  
Lindsey E. Jorgensen ◽  
Rachel E. Barrett

AbstractTelehealth appointments have grown in popularity due to the COVID-19 global pandemic. Three cases presented in this article show several different perspectives where telehealth was utilized. For the first patient, appointments were successfully completed via telehealth; however, the patient's family opted to continue with an unsecure internet connection at a local laundromat. For the second patient, a stable internet connection could not be obtained in his home, thus making telehealth appointments unavailable. The caregiver of this patient ended up driving to the clinic to have adjustments made in person. For the third patient, telehealth appointments were unavailable due to unstable internet connections as well as difficulty setting up video interpreting services. These cases highlight the idea that telehealth can be incredibly beneficial, when used correctly. For some, the option to attend appointments virtually gives them access to specialists that otherwise may not be available. For other patients, aspects such as access to smart devices and steady internet access must be considered to ensure a successful connection. The hope is that this article sheds light on some of the potential setbacks that can come from the use of telehealth appointments in a practice and provides discussion regarding for whom telehealth may be appropriate, even in pediatric patients. After reading this article, readers should be able to discuss ways in which there could be solutions for these barriers that may prevent some patients from utilizing these types of virtual appointments.


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3571 ◽  
Author(s):  
Antonio Guillen-Perez ◽  
Maria-Dolores Cano

The advent of flying ad hoc networks (FANETs) has opened an opportunity to create new added-value services. Even though it is clear that these networks share common features with its predecessors, e.g., with mobile ad hoc networks and with vehicular ad hoc networks, there are several unique characteristics that make FANETs different. These distinctive features impose a series of guidelines to be considered for its successful deployment. Particularly, the use of FANETs for telecommunication services presents demanding challenges in terms of quality of service, energy efficiency, scalability, and adaptability. The proper use of models in research activities will undoubtedly assist to solve those challenges. Therefore, in this paper, we review mobility, positioning, and propagation models proposed for FANETs in the related scientific literature. A common limitation that affects these three topics is the lack of studies evaluating the influence that the unmanned aerial vehicles (UAV) may have in the on-board/embedded communication devices, usually just assuming isotropic or omnidirectional radiation patterns. For this reason, we also investigate in this work the radiation pattern of an 802.11 n/ac (WiFi) device embedded in a UAV working on both the 2.4 and 5 GHz bands. Our findings show that the impact of the UAV is not negligible, representing up to a 10 dB drop for some angles of the communication links.


2014 ◽  
Vol 675-677 ◽  
pp. 233-236
Author(s):  
Hai Cheng Hong ◽  
Min Xu

Multistage sampling method was used to sort all cities, counties and districts in Jilin area, and stratified random convenience was applied to take the samples. According to the number of people in the pre-experiment and the number of questionnaire topics, 700 residents who had lived in the area more than a year were selected. Urban residents in Jilin area could understand the natural disaster-related knowledge and their attention to it should be higher, but their knowledge and behaviors in food hygiene-related knowledge and behaviors in natural disasters were worrying. It is necessary to strengthen the propaganda and education of food hygiene in natural disasters. TV, radio, newspapers and networks are important sources of relevant information and knowledge for the majority of residents. Different means should be taken in the publicity and training of food hygiene-related knowledge in natural disasters according to their education background.


Author(s):  
S. R. PATIL ◽  
SNEHAL SALUNKHE ◽  
NIKITA KULKARNI ◽  
PRIYANKA SAVANT

ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc.These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the E-CONVERSE, which focuses on low cost touch-screen development to enhance the dining experience. In this paper we discuss the design and implementation of a low cost, customizable touch screen. To ensure the security of the system some security strategies are discussed. Basic level testing reveals that proposed system has potential for practical implementation and can overcome several drawbacks of existing system.


2021 ◽  
Author(s):  
Lubaid Ahmed

Due to recent advances in computing and communication technologies, Mobile Ad hoc Networks (MANETs) are becoming networks of choice for various applications such as emergencies [sic] preparedness and response, military and crisis management, and healthcare, to name a few. The main reason for this is that in MANET, information exchange between nodes can happen dynamically without pre-exisiting fixed network infrastructure with designated centralized access points. However, this privilege also comes with some security drawbacks, especially from a message security viewpoint because the implementation of hard-cryptographic security now becomes a challenging prospect. In this thesis, we improve a recently proposed method of message security in MANET (so called benchmark scheme, also referred to as trust-based multipath DSR routing scheme), by introducing a trust model that makes multi-path routing flexible enough to avoid non-trusted routes that may use brute force attacks to decrypt messages travelling through the network en route to their destinations. Simulation results, coupled with theoretical justification, affirm that the proposed solution is much more secured than the above-mentioned benchmark method and traditional multi-path routing algorithms.


The recent developments in wireless communication technologies along with the costs of hardware allow both V2V and V2I communications for information exchange. Such a network is called Vehicular ad Hoc Network (VANET) which is very important for various road safety and non-safety related applications. However, Due to the wireless nature of communication in VANETs, it is also prone to various security attacks which are originally present in wireless networks. Hence to realize the highest potential of VANET, the network should be free from attackers, there by all the information exchanged in the network must be reliable should be originated from authenticated source. The system can be processed by the fuzzy logic method. It does not require any keys for data transmission. The system design is very efficient compared to other techniques. So the users prevent from road accident and traffic jam.


Author(s):  
Farhan H. Mirani ◽  
Anthony Busson ◽  
Cedric Adjih

In vehicular ad hoc networks (VANETs), for a large number of applications, the destination of relevant information such as alerts, is the whole set of vehicles located inside a given area. Therefore dissemination with efficient broadcast is an essential communication primitive. One of the families of broadcast protocols suitable for such networks, is the family of delay-based broadcast protocols, where farthest receivers retransmit first and where transmissions also act as implicit acknowledgements. For lossless networks, such protocols may approach the optimum efficiency. However with realistic loss models of VANET wireless communication, their performance is noticeably degraded. This is because packet losses have a double effect: directly on the amount of successfully received packets and indirectly with implicit acknowledgement misses. In this article, in order to combat the effects of packet losses, we combine delay-based broadcast with network coding, through a new protocol: Delay-based Opportunistic Network Coding protocol (DONC). By design, DONC aims at cancelling the twofold effects of packet and implicit acknowledgement losses. We describe the details of the DONC protocol, and we study its behavior, with realistic models and simulations. Results illustrate the excellent performance of the protocol.


Sign in / Sign up

Export Citation Format

Share Document